Now showing items 1-5 of 5

    • Thumbnail

      CoAP liburutegian konparaketa praktiko eta teorikoa 

      Iglesias Urkia, Markel (2017-06-19)
      Azken urteotan, Gauzen Internet edo Internet of Things (IoT) zabaltzen joan da eta hainbat protokolo, inplementazio eta erabilpen kasu garatu dira. Komunikazio protokoloen artean, Contrained Application Protocol (CoAP) ...
    • Thumbnail

      How to Survive Identity Management in the Industry 4.0 Era 

      Astorga Burgo, Jasone ORCID; Barceló, Marc; Urbieta Aizpurua, Aitor; Jacob, Eduardo (IEEE, 2021-07-06)
      Industry 4.0 heavily builds on massive deployment of Industrial Internet of Things (IIoT) devices to monitor every aspect of the manufacturing processes. Since the data gathered by these devices impact the output of critical ...
    • Thumbnail

      Improving efficiency and security of IIoT communications using in-network validation of server certificate 

      Atutxa Imatz, Asier ORCID; Astorga Burgo, Jasone ORCID; Barceló, Marc; Urbieta Aizpurua, Aitor; Jacob, Eduardo (Elsevier, 2023-01)
      The use of advanced communications and smart mechanisms in industry is growing rapidly, making cybersecurity a critical aspect. Currently, most industrial communication protocols rely on the Transport Layer Security (TLS) ...
    • Thumbnail

      Industrial Data Homogenization and Monitoring Scheme with Blockchain Oracles 

      Stefanescu, Denis; Galán García, Patxi; Montalvillo Mendizabal, Leticia ORCID; Unzilla Galán, Juan José ORCID; Urbieta Aizpurua, Aitor (MDPI, 2023-01-10)
      Research efforts on Distributed Ledger Technologies (DLTs) for industrial applications have constantly been increasing over the last years. The use of DLTs in the Industry 4.0 paradigm provides traceability, integrity, and ...
    • Thumbnail

      Trustworthy Users: Using IOTA and IPFS for Attribute Validation in CP-ABE and dCP-ABE Schemes 

      Mosteiro Sánchez, Aintzane; Barceló, Marc; Astorga Burgo, Jasone ORCID; Urbieta Aizpurua, Aitor (MDPI, 2023-03-10)
      Attribute spoofing is a major security threat in information exchange solutions based on Ciphertext-Policy Attribute-Based-Encryption (CP-ABE) and distributed CP-ABE (dCP-ABE), which can compromise privacy and security. ...