Luiz Albini - Academia.edu (original) (raw)

Papers by Luiz Albini

Research paper thumbnail of TRUMIT—Trust Manager for IoT

Smart innovation, systems and technologies, Dec 16, 2020

Research paper thumbnail of Middleware proposals for mobile ad hoc networks

Journal of Network and Computer Applications, Aug 1, 2014

Research paper thumbnail of Resistindo a Ataques de Personificação no Gerenciamento de Chaves Públicas em Redes Ad Hoc Móveis: Virtual Public-Key Management System

Research paper thumbnail of Análise de Aplicativos no Android utilizando Traços de Execução

Research paper thumbnail of Fully Distributed Public Key Management through Digital Signature Chains for Delay and Disrupt Tolerant Networks

Security solutions are not easily adapted to the DTN paradigm, for example, traditional key manag... more Security solutions are not easily adapted to the DTN paradigm, for example, traditional key management solutions cannot be applied in such environments. A key management scheme for DTNs must consider the dynamic topology, be self-organized and distributed and be effective in the presence of intermittent connections. There are just a few key management scheme for DTNs. Nevertheless, all of them have serious issues. They generate a huge overhead, have a single point of failure, are centralized or do not provide any security against very simple attacks. This work introduces a new key management scheme for DTNs based on chains of digital signatures (DSC-KM - Digital Signature Chains Key Management Scheme). It is decentralized, fully distributed, and does not have a single point of failure. It allows nodes to leave and joint the network at any time, works in the presence of intermittent connections, has a very small communication and memory overhead. It is based on chains of digital signatures and on a very simple chain exchange mechanism. According to simulation results, it is able to correctly and securely disseminate all certificates through the network in a short period, while maintaining the size of the chains very small. Moreover, it is able to resist to several attacks to the key management infrastructure.

Research paper thumbnail of Trace-Driven Extension for Noxim Simulator

Research paper thumbnail of Trace-driven and processing time extensions for Noxim simulator

Design Automation for Embedded Systems, Jan 5, 2019

Simulation is one of the main tools used to analyze and test new proposals in the Network-on-Chip... more Simulation is one of the main tools used to analyze and test new proposals in the Network-on-Chip field. Several simulators can be found in the literature, among them the Noxim simulator stands out. It is being used by many researchers due to the wireless support and open-source availability. An important issue at the simulation phase is the choice of workload, as it may affect testing the system and its features. The correct workload can lead to rapid and efficient system development, while the wrong one may compromise the entire system evaluation. To ensure a more realistic simulation, simulators usually relies on real workloads by using a trace-driven approach. Although Noxim provides a simple support for input traces, it is very limited to a general behavior of the system, accepting only a generic injection rate parameter over time. Another important part of the simulator is the ability to consider the Processing Elements processing time. We propose in this paper an extension of the Noxim simulator to address these issues. Consequently, results are more realistic and may be possible to predict the total execution time very accurately. This extension is demonstrated and evaluated using the NAS-NPB workload. Keywords Network-on-Chip • Simulation • Processing time • Trace 1 Introduction Network-on-Chip (NoC) [7] is the current interconnection paradigm to design all large-scale chips. It is scalable and can be adapted to several computational paradigms and applicable to This work was partially supported by CNPq and CAPES.

Research paper thumbnail of Evaluation of Hash Join Operations Performance Executing on SDN Switches: A Cost Model Approach

Journal of Information and Data Management, Sep 12, 2022

Research paper thumbnail of Supporting Confidentiality and Integrity on V2V Communications

Nefarious users or attackers may target vehicular networks for malicious objectives, such as unla... more Nefarious users or attackers may target vehicular networks for malicious objectives, such as unlawfully collecting data or tampering with communications. There are several coun-termeasures to these challenges in the literature; however, they are tailored to a specific scenario with infrastructure or focused on new routing protocols. To mitigate the effects of malicious attacks on vehicular network communications, this work proposes the development of a group-based security framework, which is independent of the routing protocol with vehicular-to-vehicular communication and capable of forming groups with trusted nodes and adding security to vehicular network communications between group members. This framework should be able to work in connected network settings while ensuring the security and integrity of the information transferred over it. To employ a hybrid cryptography system, the framework needs to have a trust management method for forming groups and establishing group-shared keys in a decentralized manner.

Research paper thumbnail of Processamento Distribuído de Operações Hash Join em Switches Programáveis: Uma Análise via Modelo de Custo

The query processing cost in distributed database systems is directly associated with transferrin... more The query processing cost in distributed database systems is directly associated with transferring data cost over the network. The Software-Defined Wide-Area Network (SD-WAN) allows (re)program network devices via software. The programmability of this architecture provides new possibilities for dynamically manage the network topology, also enabling the data processing on these devices. This paper presents an evaluation of the distributed processing of the hash join operation to the database and network devices, using an cost model. Our results show that processing the hash join operation using network switches could achieve competing results compared to traditional servers with similar data traffic.

Research paper thumbnail of Reducing Hadoop 3.x energy consumption through Energy Efficient Ethernet

Energy consumption is one of the major challenges on the big data processing infrastructure. The ... more Energy consumption is one of the major challenges on the big data processing infrastructure. The energy expenses are even higher than hardware, accounting for 75% of the total cost of nowadays data centers. Narrowing, approximately 30% of all data center energy is consumed by the network switches. Energy Efficient Ethernet is a recent standard aiming at reduce network power consumption, notwithstanding the current practice in industry is to disable it in production use, since it can cause network overloads and performance loss. This paper provides an overview on how Apache Hadoop 3.x, the current version, behaves with Energy Efficient Ethernet enabled for links from 1GbE up to 400GbE links. Presented results show that there is significant energy savings with little or no performance loss for connections up to 40GbE. Nevertheless, connections of 100GbE and 400GbE present significant performance losses due to link wake up to single transmissions. These results demonstrate the effectiveness of EEE and indicate a possible research field on the ultra high speed networks energy efficiency.

Research paper thumbnail of VANET Security through Group Broadcast Encryption

Journal of computer and communications, 2020

Research paper thumbnail of Uma análise de aplicativos de rastreamento de contato para identificar casos de Covid-19: um Mapeamento da Literatura Multivocal

Anais do XVIII Simpósio Brasileiro de Sistemas Colaborativos (SBSC 2023)

Este artigo apresenta um Mapeamento Sistemático Multivocal que visa identificar aplicativos desen... more Este artigo apresenta um Mapeamento Sistemático Multivocal que visa identificar aplicativos desenvolvidos para o contexto da pandemia de Covid-19, bem como os métodos de rastreamento de contatos utilizados por eles e suas principais funcionalidades. O MLM foi conduzido na literatura branca e cinza, totalizando 73 aplicações, sendo 70 aplicativos móveis e três protocolos. Os resultados apontam que os métodos mais utilizados são: bluetooth para rastreamento de contato; notificação pelo usuário para identificar casos positivos; troca de ID temporária para o estabelecimento da rede de contato; e notificação de exposição pelo próprio aplicativo.

Research paper thumbnail of CEIFA: A multi-level anomaly detector for smart farming

Computers and Electronics in Agriculture

Research paper thumbnail of Análise de Aplicativos no Android utilizando Traços de Execução

Anais do XX Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2020)

O Android é o sistema operacional mais utilizado por dispositivos móveis no mundo. Esse fato tem ... more O Android é o sistema operacional mais utilizado por dispositivos móveis no mundo. Esse fato tem atraído cada vez mais desenvolvedores para a plataforma devido a sua característica opensource e desenvolvimento gratuito de aplicativos. Um problema que surgiu a partir disso são os aplicativos maliciosos, que visam prejudicar o usuário final e que muitas vezes são difíceis de identificar, o que tem levado autores a propor soluções para diferenciá-los dos benignos. Nesse sentido, neste trabalho será apresentado o DroiDiagnosis, uma solução que utiliza aprendizado de máquina e que classifica 80% das amostras entre benignas e maliciosas baseada em suas características dinâmicas e estáticas.

Research paper thumbnail of An Evaluation about Routing Protocols in Delay-Tolerant Networks (DTNs) to apply Quality of Context (QoC)

Proceedings of the 14th CONTECSI International Conference on Information Systems and Technology Management, 2017

Research paper thumbnail of Ontology using to represent a systematic literature review about Quality of Context

Research paper thumbnail of Avaliação de Protocolos de Roteamento em Redes Tolerante a Atrasos e Desconexões (DTN)

Anais do Computer on the Beach, 2018

O roteamento em redes Delay-Tolerant Networks(DTN) e um desafio devido aos frequentes e longos pe... more O roteamento em redes Delay-Tolerant Networks(DTN) e um desafio devido aos frequentes e longos periodos de nao conectividade. O comportamento da rede depende de uma variedade de parâmetros que mudam ao longo do tempo e geram desafios importantes na comunicacao e no roteamento. Varios protocolos de roteamento em DTN podem ser encontrados na literatura, baseados em estrategias que vao desde inundacoes ate abordagens oportunistas. Todos esses protocolos tem pontos fortes e fracos dependendo do cenario de uso. Neste estudo, foram avaliados os protocolos Epidemic, PRoPHET, Spray-and-Wait e RAPID atraves de simulacoes, a fim de verificar seus desempenhos, considerando alguns parâmetros criticos.

Research paper thumbnail of Security challenges to smart agriculture: Current state, key issues, and future directions

Research paper thumbnail of A Reed-Solomon Based Method to Improve Message Delivery in Delay Tolerant Networks

International Journal of Wireless Information Networks, 2017

Research paper thumbnail of TRUMIT—Trust Manager for IoT

Smart innovation, systems and technologies, Dec 16, 2020

Research paper thumbnail of Middleware proposals for mobile ad hoc networks

Journal of Network and Computer Applications, Aug 1, 2014

Research paper thumbnail of Resistindo a Ataques de Personificação no Gerenciamento de Chaves Públicas em Redes Ad Hoc Móveis: Virtual Public-Key Management System

Research paper thumbnail of Análise de Aplicativos no Android utilizando Traços de Execução

Research paper thumbnail of Fully Distributed Public Key Management through Digital Signature Chains for Delay and Disrupt Tolerant Networks

Security solutions are not easily adapted to the DTN paradigm, for example, traditional key manag... more Security solutions are not easily adapted to the DTN paradigm, for example, traditional key management solutions cannot be applied in such environments. A key management scheme for DTNs must consider the dynamic topology, be self-organized and distributed and be effective in the presence of intermittent connections. There are just a few key management scheme for DTNs. Nevertheless, all of them have serious issues. They generate a huge overhead, have a single point of failure, are centralized or do not provide any security against very simple attacks. This work introduces a new key management scheme for DTNs based on chains of digital signatures (DSC-KM - Digital Signature Chains Key Management Scheme). It is decentralized, fully distributed, and does not have a single point of failure. It allows nodes to leave and joint the network at any time, works in the presence of intermittent connections, has a very small communication and memory overhead. It is based on chains of digital signatures and on a very simple chain exchange mechanism. According to simulation results, it is able to correctly and securely disseminate all certificates through the network in a short period, while maintaining the size of the chains very small. Moreover, it is able to resist to several attacks to the key management infrastructure.

Research paper thumbnail of Trace-Driven Extension for Noxim Simulator

Research paper thumbnail of Trace-driven and processing time extensions for Noxim simulator

Design Automation for Embedded Systems, Jan 5, 2019

Simulation is one of the main tools used to analyze and test new proposals in the Network-on-Chip... more Simulation is one of the main tools used to analyze and test new proposals in the Network-on-Chip field. Several simulators can be found in the literature, among them the Noxim simulator stands out. It is being used by many researchers due to the wireless support and open-source availability. An important issue at the simulation phase is the choice of workload, as it may affect testing the system and its features. The correct workload can lead to rapid and efficient system development, while the wrong one may compromise the entire system evaluation. To ensure a more realistic simulation, simulators usually relies on real workloads by using a trace-driven approach. Although Noxim provides a simple support for input traces, it is very limited to a general behavior of the system, accepting only a generic injection rate parameter over time. Another important part of the simulator is the ability to consider the Processing Elements processing time. We propose in this paper an extension of the Noxim simulator to address these issues. Consequently, results are more realistic and may be possible to predict the total execution time very accurately. This extension is demonstrated and evaluated using the NAS-NPB workload. Keywords Network-on-Chip • Simulation • Processing time • Trace 1 Introduction Network-on-Chip (NoC) [7] is the current interconnection paradigm to design all large-scale chips. It is scalable and can be adapted to several computational paradigms and applicable to This work was partially supported by CNPq and CAPES.

Research paper thumbnail of Evaluation of Hash Join Operations Performance Executing on SDN Switches: A Cost Model Approach

Journal of Information and Data Management, Sep 12, 2022

Research paper thumbnail of Supporting Confidentiality and Integrity on V2V Communications

Nefarious users or attackers may target vehicular networks for malicious objectives, such as unla... more Nefarious users or attackers may target vehicular networks for malicious objectives, such as unlawfully collecting data or tampering with communications. There are several coun-termeasures to these challenges in the literature; however, they are tailored to a specific scenario with infrastructure or focused on new routing protocols. To mitigate the effects of malicious attacks on vehicular network communications, this work proposes the development of a group-based security framework, which is independent of the routing protocol with vehicular-to-vehicular communication and capable of forming groups with trusted nodes and adding security to vehicular network communications between group members. This framework should be able to work in connected network settings while ensuring the security and integrity of the information transferred over it. To employ a hybrid cryptography system, the framework needs to have a trust management method for forming groups and establishing group-shared keys in a decentralized manner.

Research paper thumbnail of Processamento Distribuído de Operações Hash Join em Switches Programáveis: Uma Análise via Modelo de Custo

The query processing cost in distributed database systems is directly associated with transferrin... more The query processing cost in distributed database systems is directly associated with transferring data cost over the network. The Software-Defined Wide-Area Network (SD-WAN) allows (re)program network devices via software. The programmability of this architecture provides new possibilities for dynamically manage the network topology, also enabling the data processing on these devices. This paper presents an evaluation of the distributed processing of the hash join operation to the database and network devices, using an cost model. Our results show that processing the hash join operation using network switches could achieve competing results compared to traditional servers with similar data traffic.

Research paper thumbnail of Reducing Hadoop 3.x energy consumption through Energy Efficient Ethernet

Energy consumption is one of the major challenges on the big data processing infrastructure. The ... more Energy consumption is one of the major challenges on the big data processing infrastructure. The energy expenses are even higher than hardware, accounting for 75% of the total cost of nowadays data centers. Narrowing, approximately 30% of all data center energy is consumed by the network switches. Energy Efficient Ethernet is a recent standard aiming at reduce network power consumption, notwithstanding the current practice in industry is to disable it in production use, since it can cause network overloads and performance loss. This paper provides an overview on how Apache Hadoop 3.x, the current version, behaves with Energy Efficient Ethernet enabled for links from 1GbE up to 400GbE links. Presented results show that there is significant energy savings with little or no performance loss for connections up to 40GbE. Nevertheless, connections of 100GbE and 400GbE present significant performance losses due to link wake up to single transmissions. These results demonstrate the effectiveness of EEE and indicate a possible research field on the ultra high speed networks energy efficiency.

Research paper thumbnail of VANET Security through Group Broadcast Encryption

Journal of computer and communications, 2020

Research paper thumbnail of Uma análise de aplicativos de rastreamento de contato para identificar casos de Covid-19: um Mapeamento da Literatura Multivocal

Anais do XVIII Simpósio Brasileiro de Sistemas Colaborativos (SBSC 2023)

Este artigo apresenta um Mapeamento Sistemático Multivocal que visa identificar aplicativos desen... more Este artigo apresenta um Mapeamento Sistemático Multivocal que visa identificar aplicativos desenvolvidos para o contexto da pandemia de Covid-19, bem como os métodos de rastreamento de contatos utilizados por eles e suas principais funcionalidades. O MLM foi conduzido na literatura branca e cinza, totalizando 73 aplicações, sendo 70 aplicativos móveis e três protocolos. Os resultados apontam que os métodos mais utilizados são: bluetooth para rastreamento de contato; notificação pelo usuário para identificar casos positivos; troca de ID temporária para o estabelecimento da rede de contato; e notificação de exposição pelo próprio aplicativo.

Research paper thumbnail of CEIFA: A multi-level anomaly detector for smart farming

Computers and Electronics in Agriculture

Research paper thumbnail of Análise de Aplicativos no Android utilizando Traços de Execução

Anais do XX Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2020)

O Android é o sistema operacional mais utilizado por dispositivos móveis no mundo. Esse fato tem ... more O Android é o sistema operacional mais utilizado por dispositivos móveis no mundo. Esse fato tem atraído cada vez mais desenvolvedores para a plataforma devido a sua característica opensource e desenvolvimento gratuito de aplicativos. Um problema que surgiu a partir disso são os aplicativos maliciosos, que visam prejudicar o usuário final e que muitas vezes são difíceis de identificar, o que tem levado autores a propor soluções para diferenciá-los dos benignos. Nesse sentido, neste trabalho será apresentado o DroiDiagnosis, uma solução que utiliza aprendizado de máquina e que classifica 80% das amostras entre benignas e maliciosas baseada em suas características dinâmicas e estáticas.

Research paper thumbnail of An Evaluation about Routing Protocols in Delay-Tolerant Networks (DTNs) to apply Quality of Context (QoC)

Proceedings of the 14th CONTECSI International Conference on Information Systems and Technology Management, 2017

Research paper thumbnail of Ontology using to represent a systematic literature review about Quality of Context

Research paper thumbnail of Avaliação de Protocolos de Roteamento em Redes Tolerante a Atrasos e Desconexões (DTN)

Anais do Computer on the Beach, 2018

O roteamento em redes Delay-Tolerant Networks(DTN) e um desafio devido aos frequentes e longos pe... more O roteamento em redes Delay-Tolerant Networks(DTN) e um desafio devido aos frequentes e longos periodos de nao conectividade. O comportamento da rede depende de uma variedade de parâmetros que mudam ao longo do tempo e geram desafios importantes na comunicacao e no roteamento. Varios protocolos de roteamento em DTN podem ser encontrados na literatura, baseados em estrategias que vao desde inundacoes ate abordagens oportunistas. Todos esses protocolos tem pontos fortes e fracos dependendo do cenario de uso. Neste estudo, foram avaliados os protocolos Epidemic, PRoPHET, Spray-and-Wait e RAPID atraves de simulacoes, a fim de verificar seus desempenhos, considerando alguns parâmetros criticos.

Research paper thumbnail of Security challenges to smart agriculture: Current state, key issues, and future directions

Research paper thumbnail of A Reed-Solomon Based Method to Improve Message Delivery in Delay Tolerant Networks

International Journal of Wireless Information Networks, 2017