- Full professor, Head of Networks and Servicesedit
Key Performance Indicators (KPIs) are a higher‐level characterization of the performance of a network slice, meant to be assessable at any time. Bodies such as the GSM Alliance have proposed the use of KPIs, including, but not limited to,... more
Key Performance Indicators (KPIs) are a higher‐level characterization of the performance of a network slice, meant to be assessable at any time. Bodies such as the GSM Alliance have proposed the use of KPIs, including, but not limited to, latency, throughput, power consumption, and security. However, while latency, throughput, and power consumption are mensurable universally, security is much harder to measure. In this article, we propose using a Moving Target Defense (MTD) approach and measurable network properties to establish a new straightforward network security metric for underlying resilience against network‐centric attacks. We called it DynSec, a comprehensive model for basic network security within the network slice. Monte Carlo experimentation showed that DynSec is accurate and suitable as a KPI.
Research Interests:
The advent of future 5th Generation (5G) use cases, such as ultra-dense networking and ultra-low latency propelled by Smart Cities and IoT projects will demand revolutionary network infrastructures. The need for low latency, high... more
The advent of future 5th Generation (5G) use cases, such as ultra-dense networking and ultra-low latency propelled by Smart Cities and IoT projects will demand revolutionary network infrastructures. The need for low latency, high bandwidth, scalability, ubiquitous access and support for IoT resource-constrained devices are some of the prominent issues that networks have to face to support future 5G use cases, which arise since current wireless and mobile infrastructures are not able to fulfill. In particular, the pervasiveness and high-density of Wireless Local Area Networks (WLAN) at urban centers, together with their growing capacity and evolving standards, can be leveraged to support such demand. We argue that the integration of key 5G cornerstone technologies, such as Network Function Virtualization (NFV) and softwarization, fill some of the abovementioned gaps in regards to proper WLAN management and service orchestration. In this paper, we present a solution for slicing WLAN infrastructures, aiming to provide differentiated services on top of the same substrate through customized, isolated and independent digital building blocks. Through this proposal, we aim at efficiently handling ultra-dense networking 5G use cases to achieve benefits at unprecedented levels. Towards this goal, we present proof of concept realised over a real testbed and assess its feasibility.
Research Interests:
Research Interests:
Research Interests:
Heating appliances such as HVAC systems consume around 48% of the energy power spent on household appliances every year. With this in mind, it is relevant to increase the efficiency of those solutions. Moreover, a malfunctioning device... more
Heating appliances such as HVAC systems consume around 48% of the energy power spent on household appliances every year. With this in mind, it is relevant to increase the efficiency of those solutions. Moreover, a malfunctioning device can increase this value even further. Thus, there is a need to develop methods that allow the identification of eventual failures before they occur. This is only achievable when services capable of analyzing data, interpret it and obtaining knowledge from it, are created. This paper presents an infrastructure that supports the inspection of failure detection in boilers, making viable to forecast faults and errors. A major part of the work is data analysis and the creation of procedures that can process it. The main goal is creating an efficient system able to identify, predict and notify the occurrence of failure events. Our fundamental contribution is the possibility to scale the system to others datasets, being able to resolve different Big Data issues.
Research Interests:
Monitoring road traffic is extremely important given the possibilities it opens up in terms of studying the behavior of road users, road design and planning problems, as well as because it can be used to predict future traffic. Especially... more
Monitoring road traffic is extremely important given the possibilities it opens up in terms of studying the behavior of road users, road design and planning problems, as well as because it can be used to predict future traffic. Especially on highways that connect beaches and larger urban areas, traffic is characterized by having peaks that are highly dependent on weather conditions and rest periods. This paper describes a dataset of mobility patterns of a coastal area in Aveiro region, Portugal, fully covered with traffic classification radars, over a two-year period. The sensing infrastructure was deployed in the scope of the PASMO project, an open living lab for co-operative intelligent transportation systems. The data gathered includes the speed of the detected objects, their position, and their type (heavy vehicle, light vehicle, two-wheeler, and pedestrian). The dataset includes 74,305 records, corresponding to the aggregation of road information at 10 min intervals. A brief an...
Research Interests:
Research Interests:
Research Interests:
Handing over highly demanding tasks to remote or nearby computing units helps accommodate the service Quality of Service (QoS) requirements, and compensates for the limited computational capabilities of User Equipment (UE) such as... more
Handing over highly demanding tasks to remote or nearby computing units helps accommodate the service Quality of Service (QoS) requirements, and compensates for the limited computational capabilities of User Equipment (UE) such as smartphones and tablets. Task offloading is a promising technique being proposed for Virtualized Edge (VE) environments to solve a wide range of issues, frequently with the aim of enabling resource-intensive low-latency services. However, the volatile nature of 5G and B5G networks, as they continuously change due to dynamic policies, optimization processes, and users' mobility, formalizes a major obstacle facing offloading and overall resource orchestration. To cope with such a challenge, under the scope of Multi-access Edge Computing (MEC), a three-tier fuzzy-based orchestration strategy is proposed with the aim of offloading the users' workload to the optimum computing units to support stricter QoS requirements and reduce the perceived service delay. To evaluate our solution, we compare the proposed workload orchestrator with different employed algorithms. The evaluation shows that our orchestrator achieves nearly ideal performance, and outperforms the state-of-the-art approaches considered.
Research Interests:
Research Interests:
Research Interests:
Research Interests: Engineering, Computer Science, Machine Learning, Cloud Computing, Big Data, and 3 moreIOT, Dataset, and M M
This paper provides a first assessment of a framework that allows network operators to use advanced slicing mechanisms to establish bandwidth restrictions to the different flows of a multi-interfaced User Equipment (UE), even when it... more
This paper provides a first assessment of a framework that allows network operators to use advanced slicing mechanisms to establish bandwidth restrictions to the different flows of a multi-interfaced User Equipment (UE), even when it moves between different access technologies. The objective is to prevent individual flows from overwhelming resources available to a slice, due to the often unpredictable traffic usage (both upstream and downstream) of UEs. To realize this, OVSDB bandwidth configuration and UE-OpenFlow support were integrated into a previously existing architecture, which used Network Function Virtualization (NFV) and Software Defined Networking (SDN) to create a virtualised representation of the UE (vUE) in the operator’s cloud, and handle slice flow-based mobility in a transparent way to the endpoints. We elaborate the framework in a scenario where telecommunication providers (i.e., mobile network operators (MNO) and internet service providers (ISP)) are able to instantiate network slices when requested by an over-the-top (OTT) provider. Our enhanced framework allows the network to implement end-to-end quality of service (QoS), allowing the slice mobility capability to preserve flow-based uplink airtime resources. The framework was implemented in a experimental testbed featuring 3GPP and non-3GPP links, with results showcasing the feasibility of the proposal.
Research Interests:
Deliverable D2.1: System conceptual design of VIDAS
Research Interests:
We explore a ‘Smart-BnB scenario’ whereby someone (an Owner) advertises a smart property on a web platform. Renters use the platform for short periods, and may fully enjoy the property, including its smart features such as sensors. This... more
We explore a ‘Smart-BnB scenario’ whereby someone (an Owner) advertises a smart property on a web platform. Renters use the platform for short periods, and may fully enjoy the property, including its smart features such as sensors. This scenario should further ensure the Renter’s privacy, so we use consent receipts and selective sharing. This paper describes a demonstrator of how smart environments can operate in a privacy respecting manner.
Research Interests:
The fact that most IoT solutions are provided by 3rd-parties, along with the pervasiveness of the collected data, raises privacy and security concerns. There is a need to verify which data is being sent to the 3rd-party, as well as... more
The fact that most IoT solutions are provided by 3rd-parties, along with the pervasiveness of the collected data, raises privacy and security concerns. There is a need to verify which data is being sent to the 3rd-party, as well as preventing those channels from becoming an exploitation avenue. We propose to use existing API definition languages to create contracts which define the data that can be transmitted, in what format, and with which constraints. To verify the compliance with these contracts, we propose a converging "Multi-Access Edge Computing" architecture which validates RESTalike API requests/responses against a Swagger schema. We deal with encrypted traffic using an SFC-enabled Man-in-the-Middle, allowing us to do verifications in "real-time". We devised a Proof of Concept and shown that we were able to detect (and stop) contract violations.
Research Interests:
Internet of Things (IoT) solutions are becoming very popular since everything can now be processed through a technological service. Currently, data is digital information, creating the need to design platforms and services that fill the... more
Internet of Things (IoT) solutions are becoming very popular since everything can now be processed through a technological service. Currently, data is digital information, creating the need to design platforms and services that fill the gap between data sensors and processing frameworks. IoT Platforms are responsible for attaching data sources with the remaining processing architecture. This paper presents a Machine to Machine (M2M) platform able to monitor data acquisition, processing, and visualization. The use of SCoTv2 allows users to integrate several sources and obtain relevant information only by connecting their sensors with the platform. As our preeminent goal is creating a large scale platform useful for several scenarios, a significant part of the study is related to software challenges, and the connection between technologies. Therefore, our principal contribution is the definition of effective architecture able to reply to different use cases.
Research Interests:
The rise of 5th Generation (5G) based network systems provide the prospect for an unprecedented technological revolution in different aspects of current network infrastructures to fully satisfy the high demands of smart space. This work... more
The rise of 5th Generation (5G) based network systems provide the prospect for an unprecedented technological revolution in different aspects of current network infrastructures to fully satisfy the high demands of smart space. This work addresses the challenges that raise in exploiting the potential of WiFi WLAN-sharing technology in 5G Ultra-Dense Networking (UDN) use cases. We investigate new complementary aspects of emerging 5G technologies such as Network Function Virtualization (NFV) and Fog computing to design a unique WiFi WLAN-sharing ecosystem to allow complying with 5G UDN critical requirements. In the resulting approach, we empower WiFi WLAN-sharing infrastructures with Fog computing capabilities and follow a slice-defined approach, aiming to provide differentiated services at unprecedented levels, on top of the same infrastructure through customized, isolated and independent building blocks. The solution also enables slices to accommodate applications besides networking functions, seeking to provide ultra-low latency rates by leveraging direct linkage to data producer entities. A proof of concept was conducted by carrying out experiments in a real laboratory testbed, allowing insights into the feasibility and suitability of slicing WiFi WLAN-sharing systems.
Research Interests:
Heating appliances consume approximately 48 % of the energy spent on household appliances every year. Furthermore, a malfunctioning device can increase the cost even further. Thus, there is a need to create methods that can identify the... more
Heating appliances consume approximately 48 % of the energy spent on household appliances every year. Furthermore, a malfunctioning device can increase the cost even further. Thus, there is a need to create methods that can identify the equipment’s malfunctions and eventual failures before they occur. This is only possible with a combination of data acquisition, analysis and prediction/forecast. This paper presents an infrastructure that supports the previously mentioned capabilities and was deployed for failure detection in boilers, making possible to forecast faults and errors. We also present our initial predictive maintenance models based on the collected data.
Research Interests:
Research Interests:
The concept of cooperative communication appears as a beneficial method that can address key challenges faced by wireless networks. Cooperative techniques in IEEE 802.11 MAC protocols have thus received significant attention both in... more
The concept of cooperative communication appears as a beneficial method that can address key challenges faced by wireless networks. Cooperative techniques in IEEE 802.11 MAC protocols have thus received significant attention both in theoretical and practical aspects. In this survey article, we provide an overview of existing research on cooperative MAC protocols in the IEEE 802.11 standard. We specially focus on protocol’s behavior and propose a novel architectural model for cooperation. We present a classification of cooperative relay based MAC protocols, along model desired categories, and review representative cooperative protocols for 802.11. We further evaluate the operational issues of cooperative protocols in term of architecture, compatibility and complexity.
Research Interests:
The Future Internet approach requires new solutions to support novel usage scenarios driven by the technological evolution and the new service demands. However, this paradigm shift requires deeper changes in the existing systems, which... more
The Future Internet approach requires new solutions to support novel usage scenarios driven by the technological evolution and the new service demands. However, this paradigm shift requires deeper changes in the existing systems, which makes Internet providers reluctant in deploying the full transformation required for the Future Internet. The Entity Title Architecture (ETArch) is a holistic clean-slate Future Internet system embedding new services for these scenarios leveraging the Software Defined Networking (SDN) concept materialized by the OpenFlow. However, legacy ETArch deploys a fully per-flow approach to provision the same transport model for all sessions (equivalent to the Internet best-effort), while suffering with performance drawbacks and lacking Quality of Service (QoS) control. To that, we evolved ETArch with SMART (Support of Mobile Sessions with High Transport Network Resource Demand) QoS control approach, which coordinates admission control and dynamic control of super-dimensioned resources to accommodate multimedia sessions with QoS-guaranteed over time, while keeping scalability/performance and users with full Quality of Experience (QoE). The SMART-enabled ETArch system evaluation was carried out using a real Testbed of the OFELIA Brazilian Island, confirming its benefits in both data and control planes over the legacy ETArch.
Research Interests:
Research Interests:
Research Interests:
The new communication paradigm established by social media along with its growing popularity in recent years contributed to attract an increasing interest of several research fields. One such research field is the field of event detection... more
The new communication paradigm established by social media along with its growing popularity in recent years contributed to attract an increasing interest of several research fields. One such research field is the field of event detection in social media. The contribution of this article is to implement a system to detect newsworthy events in Twitter. The proposed pipeline first splits the tweets into segments. These segments are then ranked. The top k segments in this ranking are then grouped together. Finally, the resulting candidate events are filtered in order to retain only those related to real-world newsworthy events. The implemented system was tested with three months of data, representing a total of 4,770,636 tweets written in Portuguese. In terms of performance, the proposed approach achieved an overall precision of 88% and a recall of 38%.
Research Interests:
Database applications are being increasingly under pressure to respond effectively to ever more demanding performance requirements. Software architects can resort to several well-known architectural tactics to minimize the possibility of... more
Database applications are being increasingly under pressure to respond effectively to ever more demanding performance requirements. Software architects can resort to several well-known architectural tactics to minimize the possibility of coming across with any performance bottleneck. The usage of call-level interfaces (CLIs) is a strategy aimed at reducing the overhead of business components. CLIs are low-level APIs that provide a high-performance environment to execute standard SQL statements on relational and also on some NoSQL database (DB) servers. In spite of these valuable features, CLIs are not thread-safe when distinct threads need to share datasets retrieved through Select statements from databases. Thus, even in situations where two or more threads could share a dataset, there is no other possibility than providing each thread with its own dataset, this way leading to an increased need of computational resources. To overcome this drawback, in this paper we propose a new na...
Research Interests:
Research Interests:
Research Interests:
Database applications are a very pervasive tool that enable businesses to make the most out of the data they collect and generate. Furthermore, they can also be used to provide services on top of such data that can access, process, modify... more
Database applications are a very pervasive tool that enable businesses to make the most out of the data they collect and generate. Furthermore, they can also be used to provide services on top of such data that can access, process, modify and explore it. It was argued in the work this paper extends that when client applications that access a database directly run on public or semi-public locations that are not highly secured (such as a reception desk), the database credentials used could be stolen by a malicious user. To prevent such an occurrence, solutions such as virtual private networks (VPNs) can be used to secure access to the database. However, VPNs can be bypassed by accessing the database from within the business network in an internal attack, among other problems. A methodology called Secure Proxied Database Connectivity (SPDC) is presented which aims to push the database credentials out of the client applications and divides the information required to access them between a proxy and an authentication server, while supporting existing tools and protocols that provide access to databases, such as JDBC. This approach will be shown and further detailed in this paper in terms of attack scenarios, implementation and discussion.
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Agnostic fault-tolerant systems cannot recover to a consistent state if a failure/crash occurs during a transaction. By their nature, inconsistent states are very difficult to be treated and recovered into the previous consistent state.... more
Agnostic fault-tolerant systems cannot recover to a consistent state if a failure/crash occurs during a transaction. By their nature, inconsistent states are very difficult to be treated and recovered into the previous consistent state. One of the most common fault tolerance mechanisms consists in logging the system state whenever a modification takes place, and recovering the system to the system previous consistent state in the event of a failure. This principle was used to design a general recovering log-based model capable of providing data consistency on agnostic fault-tolerant systems. Our proposal describes how a logging mechanism can recover a system to a consistent state, even if a set of actions of a transaction were interrupted mid-way, due to a server crash. Two approaches of implementing the logging system are presented: on local files and on memory in a remote fault-tolerant cluster. The implementation of a proof of concept resorted to a previous proposed framework, which provides common relational features to NoSQL database management systems. Among the missing features, the previous proposed framework used in the proof of concept, was not fault-tolerant.
Research Interests:
Research Interests:
Research Interests:
Research Interests:
IoT platforms have become quite complex from a technical viewpoint, becoming the cornerstone for information sharing, storing, and indexing given the unprecedented scale of smart services being available by massive deployments of a large... more
IoT platforms have become quite complex from a technical viewpoint, becoming the cornerstone for information sharing, storing, and indexing given the unprecedented scale of smart services being available by massive deployments of a large set of data-enabled devices. These platforms rely on structured formats that exploit standard technologies to deal with the gathered data, thus creating the need for carefully designed customised systems that can handle thousands of heterogeneous data sensors/actuators, multiple processing frameworks, and storage solutions. We present the SCoT2.0 platform, a generic-purpose IoT Platform that can acquire, process, and visualise data using methods adequate for both real-time processing and long-term Machine Learning (ML)-based analysis. Our goal is to develop a large-scale system that can be applied to multiple real-world scenarios and is potentially deployable on private clouds for multiple verticals. Our approach relies on extensive service containe...
Research Interests:
5G systems are putting increasing pressure on Telecom operators to enhance users’ experience, leading to the development of more techniques with the aim of improving service quality. However, it is essential to take into consideration not... more
5G systems are putting increasing pressure on Telecom operators to enhance users’ experience, leading to the development of more techniques with the aim of improving service quality. However, it is essential to take into consideration not only users’ demands but also service providers’ interests. In this work, we explore policies that satisfy both views. We first formulate a mathematical model to compute End-to-End (E2E) delay experienced by mobile users in Multi-access Edge Computing (MEC) environments. Then, dynamic Virtual Machine (VM) allocation policies are presented, with the objective of satisfying mobile users Quality of Service (QoS) requirements, while optimally using the cloud resources by exploiting VM resource reuse.Thus, maximizing the service providers’ profit should be ensured while providing the service required by users. We further demonstrate the benefits of these policies in comparison with previous works.
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
The state-of-the-art solutions for detection of Network Neutrality (NN) violations assume that all detectable Traffic Differentiations (TDs) are in fact NN violations. However, legislators and regulatory agencies state instructions that... more
The state-of-the-art solutions for detection of Network Neutrality (NN) violations assume that all detectable Traffic Differentiations (TDs) are in fact NN violations. However, legislators and regulatory agencies state instructions that establish which TDs may be considered as violations (or are allowed), and in which conditions. We advocate that these instructions should be considered before signaling a detected TD as an NN violation. In this paper, we are concerned with quantifying how much these instructions influence the results achieved by state-of-theart solutions. We analyzed the public dataset of TDs detected by Glasnost under the regulatory perspective. We found that in specific circumstances, up to 48% of detected TDs cannot be conclusively signaled as NN violations. Our findings point towards the need for additional considerations when designing solutions focusing on NN, and to weaker conclusions drawn by solutions that ignore the regulatory perspective of the Internet.
Research Interests:
Network slicing emerges as a key technology in next generation networks, boosted by the integration of software‐defined networking and network functions virtualization. However, while allowing resource sharing among multiple tenants, such... more
Network slicing emerges as a key technology in next generation networks, boosted by the integration of software‐defined networking and network functions virtualization. However, while allowing resource sharing among multiple tenants, such networks must also ensure the security requirements needed for the scenarios they are employed. This letter presents the leading security challenges on the use of network slices at the packet core, the solutions that academy and industry are proposing to address them, pointing out some directions that should be considered.