Carlos Becker Westphall

Carlos Becker Westphall
Federal University of Santa Catarina | UFSC · Departamento de Informática e Estatística

Full Professor

About

354
Publications
727,222
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,816
Citations
Introduction
Carlos Becker Westphall is Full Professor (since 1993) in the Department of Informatics and Statistics at the Federal University of Santa Catarina - Brazil, where he acts as the leader of the Network and Management Laboratory. Obtained a degree in Electrical Engineering in 1985 and a M.Sc. degree in Computer Science in 1988, both at the Federal University of Rio Grande do Sul, Brazil. Obtained a D.Sc. degree in Computer Science at the Université Paul Sabatier, France, in 1991.
Additional affiliations
August 1993 - present
Federal University of Santa Catarina
Position
  • Professor (Full)
August 1993 - present
Federal University of Santa Catarina

Publications

Publications (354)
Conference Paper
Full-text available
Mutual Authen+ca+on for IoT in the Context of Fog Compu+ng Leandro Loffi Lukas Derner Grüdtner Carla Merkle Westphall Carlos Becker Westphall Post-graduate Program in Computer Science Federal University of Santa Catarina, Brazil COMSNETS 2019 - 11th InternaOonal Conference on COMmunicaOon Systems & NETworkS Bengaluru, India, January 7 – 11, 2019
Article
Full-text available
Purpose – The objectives of the proposed model are: aiding nursing staff in documentation tasks, which can be onerous and stressful; and helping management by offering an estimate of the nursing workload, which can be considered for administrative purposes, such as staff scheduling. Design/methodology/approach – An exploratory-descriptive study was...
Article
Full-text available
In Agrifood scenarios, where farmers need to ensure that their produce is safely produced, transported, and stored, they rely on a network of IoT devices to monitor conditions such as temperature and humidity throughout the supply chain. However, managing this large-scale IoT environment poses significant challenges, including transparency, traceab...
Article
Full-text available
We explore the challenges around security configuration and performance while utilizing publish–subscribe protocols in the Internet of Things, edge computing, and fog computing. Issues in security configuration can lead to disruptions and higher operation costs. These issues can be prevented by selecting the appropriate transmission technology for...
Article
Full-text available
Special security techniques, such as intrusion detection mechanisms, are indispensable in modern computer systems. With the emergence of the Internet of Things they have become even more important. It is important to detect and identify the attack in a category so that countermeasures specific to the threat category can be resolved. However, most e...
Preprint
Full-text available
Large Language Models (LLMs) have quickly risen to prominence due to their ability to perform at or close to the state-of-the-art in a variety of fields while handling natural language. An important field of research is the application of such models at the cybersecurity context. This survey aims to identify where in the field of cybersecurity LLMs...
Conference Paper
Full-text available
Blockchain technology has shown promise in addressing transparency, traceability, and accountability issues in the agrifood supply chain. However, the pursuit of transparency raises privacy concerns, and the integration of IoT devices brings about challenges in terms of performance, mobility, and data volume. We introduce a two-layer architecture f...
Preprint
Full-text available
Recent advances in integrated technologies such as the Internet of Things with limitations in computational resources, specifically when dealing with Wireless Sensor Networks, present challenges for the application of conventional security methods such as Intrusion Detection Systems. This article describes the application of a security solution bas...
Preprint
Full-text available
Blockchain is portrayed as a technology capable of solving problems of transparency, traceability, data tampering and accountability in the Agrifood supply chain. However, the transparency provided brings privacy issues and furthermore, this sector is characterized by the use of IoT devices for process automation, and these devices have problems of...
Article
Full-text available
There are many security challenges in IoT, especially related to the authentication of restricted devices in long-distance and low-throughput networks. Problems such as impersonation, privacy issues, and excessive battery usage are some of the existing problems evaluated through the threat modeling of this work. A formal assessment of security solu...
Chapter
Full-text available
Intrusion detection is one of the key points in computer security, and it aims to identify attempted attacks by unauthorized users. Several researches are being developed to solve security problems in environments involving the Internet of Things, Fog Computing, and Cloud Computing. This mini-course has a theoretical and practical profile, aims to...
Conference Paper
Full-text available
The growth of the Internet of Things (IoT) and computing applications creates a greater possibility of vulnerabilities, which malicious entities can use to cause damage. This makes special security techniques as intrusion detection mechanisms indispensable in modern computer systems. It is important to detect and identify the attack in a category s...
Conference Paper
Full-text available
AUTISM imbalance range jumble (AIRJ) is a problem where patients can't communicate and interface. As of late it is an issue to be worried that one of every 59 youngsters has recognized as a chemical imbalance range jumble patient. ASDs start from adolescence in any case, side effects can be recognized in adulthood. That is the reason these kids are...
Article
Full-text available
An Internet of Things (IoT) device that can automatically measure water consumption can help prevent excessive water usage or leaks. However, automating too many residences or condominiums with multiple IoT devices can lead to extra energy consumption and more network congestion. We propose controlling the energy consumption of an IoT water consump...
Conference Paper
Full-text available
Multi-access Edge Computing (MEC) is a type of network architecture that provides cloud computing capabilities at the edge of the network. We consider the use case of video surveillance for an university campus running on a 5G-MEC environment. A key issue is the eventual overloading of computing resources on the MEC nodes during peak demand. We pro...
Conference Paper
Full-text available
The security of constrained devices in Internet ofThings presents itself as a challenge due to the limitation of existing resources. It is important to analyze appropriate security mechanisms for this resource-constrained environment, specifically for authentication. This study presents an experiment that analyzes a proposal for an original Constra...
Article
Full-text available
We introduce a lightweight specification-based internal intrusion detection system for smart environments monitoring IoT devices directly in fog computing layer, solving latency issues and being able to protect fog and above layers from denial of service (DoS) attacks. We further investigate different approaches to mitigate an attack considering no...
Presentation
Full-text available
Authentication of restricted memory devices presents significant problems since memory consumption is high in mutual authentication using cryptographic protocols in IoT environments. The development of a multi-factor mutual authentication method that can be used in fog and cloud computing remains a challenge, according to previous studies. The pres...
Article
Full-text available
The few resources available on constrained devices in Internet of Things are an important issue when we think about security. In this perspective, our work proposes an agile systematic review literature on works involving the Internet of Things, authentication, and Fog Computing. As a result, related works, opportunities, and challenges found at th...
Preprint
Multi-access Edge Computing (MEC) is a type of network architecture that provides cloud computing capabilities at the edge of the network. We consider the use case of video surveillance for an university campus running on a 5G-MEC environment. A key issue is the eventual overloading of computing resources on the MEC nodes during peak demand. We pro...
Preprint
Full-text available
We analyze the utilization of publish-subscribe protocols in IoT and Fog Computing and challenges around security configuration, performance, and qualitative characteristics. Such problems with security configuration lead to significant disruptions and high operation costs. Yet, These issues can be prevented by selecting the appropriate transmissio...
Preprint
Full-text available
The few resources available on devices restricted in Internet of Things are an important issue when we think about security. In this perspective, our work proposes a agile systematic review literature on works involving the Internet of Things, authentication, and Fog Computing. As a result, related works, opportunities, and challenges found at thes...
Preprint
Full-text available
a document portfolio for threat model and multi-factor authentication areas that represents the areas' state-of-art; • a list of the main characteristics of multi-factor authentication researches from the portfolio; • a list of the main threats to multi-factor authentication obtained from the state-of-art. A B S T R A C T This work reports that the...
Preprint
Full-text available
obtaining a sufficiently representative dataset of the authentication and threat model area to support future research. • a set of statistical analyzes of publication data, such as sources, publication by time, and most cited publications. • analysis of the top ten articles with the highest number of citations of the entire period and classificatio...
Article
Full-text available
Currently, the Internet of Things is spreading in all areas that apply computing resources. An important ally of the IoT is fog computing. It extends cloud computing and services to the edge of the network. Smart environments are becoming real and possible through IoT and fog computing. However, they are not free from security threats and vulnerabi...
Cover Page
Full-text available
The COVID-19 pandemic has had a significant negative impact in all parts of the world. Although public healthcare system continues to play a vital role in restricting the spread of the virus, the strain on their resources and the manner in which they operate have become key issues that need to be addressed, with especial focus on the healthcare man...
Article
Full-text available
The COVID-19 pandemic has had a significant negative impact in all parts of the world. Although public healthcare system continues to play a vital role in restricting the spread of the virus, the strain on their resources and the manner in which they operate have become key issues that need to be addressed, with especial focus on the healthcare man...
Article
Full-text available
Due to Internet of Things devices resource limitations, security often does not receive enough attention. Intrusion detection approaches are important for identifying attacks and taking appropriate countermeasures for each specific threat. This work presents a two-step approach for intrusion detection and identification. The first step performs a t...
Conference Paper
Full-text available
Given the use of web applications on dynamic environments of cloudcomputing integrated with IoT devices, SQL injection and XSS (Cross-Site Scrip-ting) attacks continue to cause security problems. The detection of maliciousrequests on the application level is a research challenge that’s evolving by theuse of Machine Learning and neural network. This...
Conference Paper
Full-text available
The Internet of Things (IoT) systems have limited resources, making it difficult to implement some security mechanisms. It is important to detect attacks against these environments and identify their type. However, existing multi-class detection approaches present difficulties related to false positives and detection of less common attacks. Thus, t...
Conference Paper
Full-text available
IoT devices emerge to integrate devices (or "things") into the Internet, but with limited computational resources, thus IoT networks have been integrated into the cloud and fog paradigms. On the other hand, AI techniques have been shown to be efficient in several areas, especially for data classification and prediction. In this paper, it is propose...
Presentation
Full-text available
Authentication of restricted memory devices presents significant problems since memory consumption is high in mutual authentication using cryptographic protocols in IoT environments. The development of a multi-factor mutual authentication method that can be used in fog and cloud computing remains a challenge, according to previous studies. The pres...
Article
Full-text available
We introduce an Autonomic System to perform management of energy consumption in Internet of Things (IoT) devices and Fog Computing, including an advanced orchestration mechanisms to manage dynamic duty cycles for extra energy savings. The solution works by adjusting Home (H) and Away (A) cycles based on contextual information, like environmental co...
Preprint
Full-text available
This work provides the basis to understand and select Cloud Computing models applied for the development of IoT solutions using Low-Power Wide Area Network (LPWAN). Cloud Computing paradigm has transformed how the industry implement solution, through the commoditization of shared IT infrastructures. The advent of massive Internet of Things (IoT) an...
Preprint
Full-text available
We introduce a system for Autonomic Management of Power Consumption in setups that involve Internet of Things (IoT) and Fog Computing. The Central IoT (CIoT) is a Fog Computing based solution to provide advanced orchestration mechanisms to manage dynamic duty cycles for extra energy savings. The solution works by adjusting Home (H) and Away (A) cyc...
Book
Full-text available
Welcome Messages from IEEE BigDataSE 2020 Program Chairs On behalf of the Program Committee of the 14th IEEE International Conference on Big Data Science and Engineering (IEEE BigDataSE 2020), we would like to welcome you to join the conference in Guangzhou, China, December 29, 2020 - January 1, 2021. The IEEE BigDataSE 2020 Conference is a forum f...
Article
Full-text available
Authentication of restricted memory devices presents significant problems since memory consumption is high in mutual authentication using cryptographic protocols in IoT environments. According to previous studies, the development of a multi-factor mutual authentication method that can be used in fog and cloud computing remains a challenge. The pres...
Conference Paper
A escolha de qual protocolo de mensagem usar em uma aplicação IoT envolve vários fatores e certo número de experimentações. Este trabalho visa compartilhar informações sobre a montagem de uma ambiente de experimentação para protocolos de mensagem em IoT. Traz um descrição das tecnologias utilizadas na programação, como brokers e suporte a geração d...
Conference Paper
Soluções seguras para IoT e agronegócios são primordiais. Entretanto se faz necessária a adoção da tecnologia adequada para o desenvolvimento de sistemas nesta área. Com foco nos protocolos de mensagem pub/sub, nosso trabalho traz uma visão geral dos protocolos de mensagem AQMP, MQTT e STOMP, uma descrição de caso de uso de aplicação de segurança n...
Cover Page
Full-text available
Welcome Messages from IEEE BigDataSE 2020 Program Chairs On behalf of the Program Committee of the 14th IEEE International Conference on Big Data Science and Engineering (IEEE BigDataSE 2020), we would like to welcome you to join the conference in Guangzhou, China, December 29, 2020 - January 1, 2021. The IEEE BigDataSE 2020 Conference is a foru...
Article
Full-text available
In the Internet of Things (IoT) systems, information of various kinds is continuously captured, processed, and transmitted by systems generally interconnected by the Internet and distributed solutions. Attacks to capture information and overload services are common. This fact makes security techniques indispensable in IoT environments. Intrusion de...
Preprint
Full-text available
Choose a message protocol to use in an IoT application involves several factors and a number of experiments. This work aims to share information about setting up an experimentation environment for IoT message protocols. It provides a description of the technologies used in programming, such as brokers and support for the generation of graphics. It...
Preprint
Full-text available
Secure solutions for IoT and agribusiness are critical. However, it is necessary to adopt the appropriate technology for the development of systems in this area. With a focus on pub/sub message protocols, our work provides an overview of the message protocols AQMP, MQTT and STOMP, a use case description of security application in agribusiness and a...
Article
Full-text available
This work provides the basis to understand and select Cloud Computing models applied for the development of IoT solutions using Low-Power Wide Area Network (LPWAN). Cloud Computing paradigm has transformed how the industry implement solution, through the commoditization of shared IT infrastructures. The advent of massive Internet of Things (IoT) an...
Article
Full-text available
We propose a flexible meta‐heuristic framework for virtual machine (VM) organisation, provisioning, and adaptation in the cloud domain, based on migration costs and environment constraints. Order@Cloud improves VM placements according to multiple objectives represented by rules, qualifiers, and improvement cost, which can be easily modified and ext...
Article
Full-text available
The Internet of Things and Fog Computing are technologies currently used in many areas. They can be applied to provide a residential automation environment, for example, fire alarm applications, gas leak alarms, among others. Security-related searches for these fog-based environments are still in the early stages. Also, the fact that these environm...
Article
Full-text available
We present a method for autonomic intrusion detection and response to optimize processes of cybersecurity in large distributed systems. These environments are characterized by technology fragmentation and complex operations making them highly susceptible to attacks like hijacking, man-in-the-middle, denial-of-service, phishing, and others. The auto...
Conference Paper
Full-text available
With the increasing advancement of services on the Internet, due to the strengthening of cloud computing, the exchange of data between providers and users is intense. Management of access control and applications need data to identify users and/or perform services in an automated and more practical way. Applications have to protect access to data c...
Conference Paper
Full-text available
Internet of Things (IoT) is the connection of any object to the internet, to generate useful information about its own state or surrounding environment. IoT allows new products and services to be applied in different areas, such as smart cities, industry, smart homes, environment monitoring, smart cars, heath monitoring and others. Fog computing em...
Conference Paper
Full-text available
Fog Computing is an area of Computer Science that is under constant construction and evolution, and in conjunction with information security, the paradigm becomes more reliable and secure for IoT’s edge platforms. The authentication of restricted memory devices has major problems because memory consumption is high when applied with other models tha...
Presentation
Full-text available
The authentication of restricted memory devices has major problems because memory consumption is high when applied with other protocols that have the purpose of mutual authentication. This article proposes an authentication model that validates mutually the parties in an Internet of Things environment applied in the context of Fog Computing. Throug...
Preprint
Full-text available
We introduce a method for Intrusion Detection based on the classification, understanding and prediction of behavioural deviance and potential threats, issuing recommendations, and acting to address eminent issues. Our work seeks a practical solutions to automate the process of identification and response to Cybersecurity threats in hybrid Distribut...
Preprint
Full-text available
We introduce a method for Intrusion Detection based on the classification, understanding and prediction of behavioural deviance and potential threats, issuing recommendations, and acting to address eminent issues. Our work seeks a practical solutions to automate the process of identification and response to Cybersecurity threats in hybrid Distribut...
Cover Page
Full-text available
Welcome Message! On behalf of the Organizing Committee, we are honored and delighted to welcome you to the 7th International Conference on Computing, Communications and Informatics (ICACCI'18), Bangalore, India. Bangalore, officially known as Bengaluru is the capital of the Indian state of Karnataka. Bangalore is popularly known as the ‘Silicon Va...
Conference Paper
Full-text available
Várias evoluções de paradigmas foram propostas nos últimos anos. Fog Computing é uma área da Ciência da Computação que está em construção e constante evolução, e em conjunto com a segurança da informação, o paradigma se torna mais confiável e seguro para as plataformas da borda do IoT. Os quesitos de segurança são de difícil alcance em ambientes com...
Book
Full-text available
Os principais problemas associados à implementação e uso da gerência de redes e serviços ocorrem devido à grande quantidade de proposições, padrões e de diferentes produtos oferecidos no mercado, dificultando consideravelmente a tomada de decisão no que se refere a utilização da abordagem de gerência de redes e serviços mais adequada. Além disso, n...
Presentation
Full-text available
Response to some questions: - What is IoT (Internet of Things) and Security for IoT? - Comment on the DDoS attack that the victim was the company Dyn, according to the ”the guardian” reported on 26 Oct. 2016. - What the really popular Internet of Things applications are right now? And in the future? - What is (will be) the interaction between IoT a...
Presentation
Full-text available
Serviços de cloud estão sempre “ligados,” e são acessíveis globalmente, assim as “coisas” podem ser localizadas em qualquer lugar, podem ser móveis, podem transmitir dados diferentes em momentos diferentes. Serviços de cloud tem escalabilidade, o que é bom em IoT já que muitas “coisas” podem se comunicar com velocidades diferentes em momentos difer...
Presentation
Full-text available
Informações para responder as seguintes perguntas: - Conceitue IoT (Internet das Coisas) e Segurança para IoT. - Comente sobre o ataque DDoS cuja a vítima foi a empresa Dyn, segundo divulgado no “theguardian” em 26/10/2016. - Cite e comente sobre alguns exemplos de aplicações de IoT. - Explique a interação entre IoT e Cloud (Fog e Edge). - Descreva...
Book
Full-text available
These proceedings contain papers selected for presentation at the 5th International Symposium on Security in Computing and Communications (SSCC’17). SSCC aims to provide the most relevant opportunity to bring together researchers and practitioners from both academia and industry to exchange their knowledge and discuss their research findings. The s...
Presentation
Full-text available
Composto de objetos físicos embutidos com eletrônica, software e sensores que permitem sensoriamento e controle remoto de objetos através de uma estrutura de rede. Facilita integração direta entre mundo físico e redes de comunicação. Comunicação: any TIME, any THING, any PLACE . Segurança de IoT não é apenas segurança de dispositivos! Todos os elem...
Book
Full-text available
The Second International Conference on Green Communications, Computing and Technologies (GREEN 2017), held between September 10-14, 2017 in Rome, continued the inaugural event focusing on current solutions, stringent requirements for further development, and evaluations of potential directions. The event targeted to bring together academia, researc...
Book
Full-text available
The Thirteenth International Conference on Wireless and Mobile Communications (ICWMC 2017), held between July 23 - 27, 2017 - Nice, France, followed on the previous events on advanced wireless technologies, wireless networking, and wireless applications. ICWMC 2017 addressed wireless related topics concerning integration of latest technological adv...
Article
Full-text available
With the rise of cloud computing, thousands of users and multiple applications have sought to communicate with each other, exchanging sensitive data. Thus, for effectively managing applications and resources, the use of models and tools is essential for the secure management of identities and to avoid compromising data privacy. There are models and...
Conference Paper
Full-text available
Quality of service is one of the major concerns in cloud computing. Virtual machines (VMs) balancing techniques can help reduce service degradation in cloud computing environments. Several works have presented cloud computing balance techniques; however, only a few used the similarity between VMs and physical hosts to map VMs migrations. In additio...
Book
Full-text available
The Thirteenth International Conference on Autonomic and Autonomous Systems (ICAS 2017), held between May 21 - 25, 2017 - Barcelona, Spain, was a multi-track event covering related topics on theory and practice on systems automation, autonomous systems and autonomic computing. The main tracks referred to the general concepts of systems automation,...
Conference Paper
Full-text available
In policy-based management, service providers want to enforce fine-grained policies for their resources and services. Besides the assurance of digital identity, service providers usually need personal data for evaluation of access control policies. The disclosure of personal data, also known as Personally Identifiable Information (PII), could repre...
Presentation
Full-text available
Abstract—In policy-based management, service providers want to enforce fine-grained policies for their resources and services. Besides the assurance of digital identity, service providers usually need personal data for evaluation of access control policies. The disclosure of personal data, also known as Personally Identifiable Information (PII), co...
Presentation
Full-text available
Autonomic Cloud Computing management requires a model to represent the elements into the managed computing process. This tutorial proposes an approach to model the load flow through abstract and concrete Cloud components. Our model has a formal mathematical background and is generic, in contrast with other proposals. It receives new Virtual Machine...
Book
Full-text available
The Sixteenth International Conference on Networks (ICN 2017), held between April 23-27, 2017 in Venice, Italy, continued a series of events targeting general networking and services aspects in multi-technologies environments. The conference covered fundamentals on networking and services, and highlighted new challenging industrial and research top...
Book
Full-text available
The Eighth International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD COMPUTING 2017), held between February 19-23, 2017 in Athens, Greece, continued a series of events meant to prospect the applications supported by the cloud computing paradigm and validate the techniques and the mechanisms. A complementary target was to identif...
Article
Full-text available
By taking two distinct Diophantine equations with distinct large prime numbers and two different coordinates , two secret keys are generated at the same time so that two users can encrypt their messages / plaintext. Hence two sets of public key exponents with one set of private key exponents were the result of proposed algorithm.
Presentation
Full-text available
Summary: 1 - Cloud Computing Security Monitoring 2 - Federated Identity for Cloud Computing 3 - Risk Analysis for Cloud Computing 4 - Secure Internet of Things
Article
Full-text available
Autonomic Cloud Computing management requires a model to represent the elements into the managed computing process. This paper proposes an approach to model the load flow through abstract and concrete cloud components using double weighted Directed Acyclic Multigraphs. Such model enables the comparison, analysis and simulation of clouds, which assi...