
Carlos Becker WestphallFederal University of Santa Catarina | UFSC · Departamento de Informática e Estatística
Carlos Becker Westphall
Full Professor
About
337
Publications
697,914
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,489
Citations
Citations since 2017
Introduction
Carlos Becker Westphall is Full Professor (since 1993) in the Department of Informatics and Statistics at the Federal University of Santa Catarina - Brazil, where he acts as the leader of the Network and Management Laboratory. Obtained a degree in Electrical Engineering in 1985 and a M.Sc. degree in Computer Science in 1988, both at the Federal University of Rio Grande do Sul, Brazil. Obtained a D.Sc. degree in Computer Science at the Université Paul Sabatier, France, in 1991.
Additional affiliations
August 1993 - present
August 1993 - present
Publications
Publications (337)
AUTISM imbalance range jumble (AIRJ) is a problem where patients can't communicate and interface. As of late it is an issue to be worried that one of every 59 youngsters has recognized as a chemical imbalance range jumble patient. ASDs start from adolescence in any case, side effects can be recognized in adulthood. That is the reason these kids are...
An Internet of Things (IoT) device that can automatically measure water consumption can help prevent excessive water usage or leaks. However, automating too many residences or condominiums with multiple IoT devices can lead to extra energy consumption and more network congestion. We propose controlling the energy consumption of an IoT water consump...
Multi-access Edge Computing (MEC) is a type of network architecture that provides cloud computing capabilities at the edge of the network. We consider the use case of video surveillance for an university campus running on a 5G-MEC environment. A key issue is the eventual overloading of computing resources on the MEC nodes during peak demand. We pro...
We introduce a lightweight specification-based internal intrusion detection system for smart environments monitoring IoT devices directly in fog computing layer, solving latency issues and being able to protect fog and above layers from denial of service (DoS) attacks. We further investigate different approaches to mitigate an attack considering no...
Authentication of restricted memory devices presents significant problems since memory consumption is high in mutual authentication using cryptographic protocols in IoT environments. The development of a multi-factor mutual authentication method that can be used in fog and cloud computing remains a challenge, according to previous studies. The pres...
The few resources available on constrained devices in Internet of Things are an important issue when we think about security. In this perspective, our work proposes an agile systematic review literature on works involving the Internet of Things, authentication, and Fog Computing. As a result, related works, opportunities, and challenges found at th...
Multi-access Edge Computing (MEC) is a type of network architecture that provides cloud computing capabilities at the edge of the network. We consider the use case of video surveillance for an university campus running on a 5G-MEC environment. A key issue is the eventual overloading of computing resources on the MEC nodes during peak demand. We pro...
We analyze the utilization of publish-subscribe protocols in IoT and Fog Computing and challenges around security configuration, performance, and qualitative characteristics. Such problems with security configuration lead to significant disruptions and high operation costs. Yet, These issues can be prevented by selecting the appropriate transmissio...
The few resources available on devices restricted in Internet of Things are an important issue when we think about security. In this perspective, our work proposes a agile systematic review literature on works involving the Internet of Things, authentication, and Fog Computing. As a result, related works, opportunities, and challenges found at thes...
a document portfolio for threat model and multi-factor authentication areas that represents the areas' state-of-art; • a list of the main characteristics of multi-factor authentication researches from the portfolio; • a list of the main threats to multi-factor authentication obtained from the state-of-art. A B S T R A C T This work reports that the...
obtaining a sufficiently representative dataset of the authentication and threat model area to support future research. • a set of statistical analyzes of publication data, such as sources, publication by time, and most cited publications. • analysis of the top ten articles with the highest number of citations of the entire period and classificatio...
Currently, the Internet of Things is spreading in all areas that apply computing resources. An important ally of the IoT is fog computing. It extends cloud computing and services to the edge of the network. Smart environments are becoming real and possible through IoT and fog computing. However, they are not free from security threats and vulnerabi...
The COVID-19 pandemic has had a significant negative impact in all parts of the world. Although public healthcare system continues to play a vital role in restricting the spread of the virus, the strain on their resources and the manner in which they operate have become key issues that need to be addressed, with especial focus on the healthcare man...
The COVID-19 pandemic has had a significant negative impact in all parts of the world. Although public healthcare system continues to play a vital role in restricting the spread of the virus, the strain on their resources and the manner in which they operate have become key issues that need to be addressed, with especial focus on the healthcare man...
Due to Internet of Things devices resource limitations, security often does not receive enough attention. Intrusion detection approaches are important for identifying attacks and taking appropriate countermeasures for each specific threat. This work presents a two-step approach for intrusion detection and identification. The first step performs a t...
Given the use of web applications on dynamic environments of cloudcomputing integrated with IoT devices, SQL injection and XSS (Cross-Site Scrip-ting) attacks continue to cause security problems. The detection of maliciousrequests on the application level is a research challenge that’s evolving by theuse of Machine Learning and neural network. This...
The Internet of Things (IoT) systems have limited resources, making it difficult to implement some security mechanisms. It is important to detect attacks against these environments and identify their type. However, existing multi-class detection approaches present difficulties related to false positives and detection of less common attacks. Thus, t...
IoT devices emerge to integrate devices (or "things") into the Internet, but with limited computational resources, thus IoT networks have been integrated into the cloud and fog paradigms. On the other hand, AI techniques have been shown to be efficient in several areas, especially for data classification and prediction. In this paper, it is propose...
Authentication of restricted memory devices presents significant problems since memory consumption is high in mutual authentication using cryptographic protocols in IoT environments. The development of a multi-factor mutual authentication method that can be used in fog and cloud computing remains a challenge, according to previous studies. The pres...
We introduce an Autonomic System to perform management of energy consumption in Internet of Things (IoT) devices and Fog Computing, including an advanced orchestration mechanisms to manage dynamic duty cycles for extra energy savings. The solution works by adjusting Home (H) and Away (A) cycles based on contextual information, like environmental co...
This work provides the basis to understand and select Cloud Computing models applied for the development of IoT solutions using Low-Power Wide Area Network (LPWAN). Cloud Computing paradigm has transformed how the industry implement solution, through the commoditization of shared IT infrastructures. The advent of massive Internet of Things (IoT) an...
We introduce a system for Autonomic Management of Power Consumption in setups that involve Internet of Things (IoT) and Fog Computing. The Central IoT (CIoT) is a Fog Computing based solution to provide advanced orchestration mechanisms to manage dynamic duty cycles for extra energy savings. The solution works by adjusting Home (H) and Away (A) cyc...
Welcome Messages from IEEE BigDataSE 2020 Program Chairs
On behalf of the Program Committee of the 14th IEEE International Conference on Big Data Science and Engineering (IEEE BigDataSE 2020), we would like to welcome you to join the conference in Guangzhou, China, December 29, 2020 - January 1, 2021.
The IEEE BigDataSE 2020 Conference is a forum f...
Authentication of restricted memory devices presents significant problems since memory consumption is high in mutual authentication using cryptographic protocols in IoT environments. According to previous studies, the development of a multi-factor mutual authentication method that can be used in fog and cloud computing remains a challenge. The pres...
A escolha de qual protocolo de mensagem usar em uma aplicação IoT envolve vários fatores e certo número de experimentações. Este trabalho visa compartilhar informações sobre a montagem de uma ambiente de experimentação para protocolos de mensagem em IoT. Traz um descrição das tecnologias utilizadas na programação, como brokers e suporte a geração d...
Soluções seguras para IoT e agronegócios são primordiais. Entretanto se faz necessária a adoção da tecnologia adequada para o desenvolvimento de sistemas nesta área. Com foco nos protocolos de mensagem pub/sub, nosso trabalho traz uma visão geral dos protocolos de mensagem AQMP, MQTT e STOMP, uma descrição de caso de uso de aplicação de segurança n...
Welcome Messages from IEEE BigDataSE 2020 Program Chairs
On behalf of the Program Committee of the 14th IEEE International Conference on Big Data Science and Engineering (IEEE BigDataSE 2020), we would like to welcome you to join the conference in Guangzhou, China, December 29, 2020 - January 1, 2021.
The IEEE BigDataSE 2020 Conference is a foru...
In the Internet of Things (IoT) systems, information of various kinds is continuously captured, processed, and transmitted by systems generally interconnected by the Internet and distributed solutions. Attacks to capture information and overload services are common. This fact makes security techniques indispensable in IoT environments. Intrusion de...
Choose a message protocol to use in an IoT application involves several factors and a number of experiments. This work aims to share information about setting up an experimentation environment for IoT message protocols. It provides a description of the technologies used in programming, such as brokers and support for the generation of graphics. It...
Secure solutions for IoT and agribusiness are critical. However, it is necessary to adopt the appropriate technology for the development of systems in this area. With a focus on pub/sub message protocols, our work provides an overview of the message protocols AQMP, MQTT and STOMP, a use case description of security application in agribusiness and a...
This work provides the basis to understand and select Cloud Computing models applied for the development of IoT solutions using Low-Power Wide Area Network (LPWAN). Cloud Computing paradigm has transformed how the industry implement solution, through the commoditization of shared IT infrastructures. The advent of massive Internet of Things (IoT) an...
We propose a flexible meta‐heuristic framework for virtual machine (VM) organisation, provisioning, and adaptation in the cloud domain, based on migration costs and environment constraints. Order@Cloud improves VM placements according to multiple objectives represented by rules, qualifiers, and improvement cost, which can be easily modified and ext...
The Internet of Things and Fog Computing are technologies currently used in many areas. They can be applied to provide a residential automation environment, for example, fire alarm applications, gas leak alarms, among others. Security-related searches for these fog-based environments are still in the early stages. Also, the fact that these environm...
We present a method for autonomic intrusion detection and response to optimize processes of cybersecurity in large distributed systems. These environments are characterized by technology fragmentation and complex operations making them highly susceptible to attacks like hijacking, man-in-the-middle, denial-of-service, phishing, and others. The auto...
With the increasing advancement of services on the Internet, due to the strengthening of cloud computing, the exchange of data between providers and users is intense. Management of access control and applications need data to identify users and/or perform services in an automated and more practical way. Applications have to protect access to data c...
Internet of Things (IoT) is the connection of any object to the internet, to generate useful information about its own state or surrounding environment. IoT allows new products and services to be applied in different areas, such as smart cities, industry, smart homes, environment monitoring, smart cars, heath monitoring and others. Fog computing em...
Fog Computing is an area of Computer Science that is under constant construction and evolution, and in conjunction with information security, the paradigm becomes more reliable and secure for IoT’s edge platforms. The authentication of restricted memory devices has major problems because memory consumption is high when applied with other models tha...
The authentication of restricted memory devices has major problems because memory consumption is high when applied with other protocols that have the purpose of mutual authentication. This article proposes an authentication model that validates mutually the parties in an Internet of Things environment applied in the context of Fog Computing. Throug...
We introduce a method for Intrusion Detection based on the classification, understanding and prediction of behavioural deviance and potential threats, issuing recommendations, and acting to address eminent issues. Our work seeks a practical solutions to automate the process of identification and response to Cybersecurity threats in hybrid Distribut...
We introduce a method for Intrusion Detection based on the classification, understanding and prediction of behavioural deviance and potential threats, issuing recommendations, and acting to address eminent issues. Our work seeks a practical solutions to automate the process of identification and response to Cybersecurity threats in hybrid Distribut...
Welcome Message!
On behalf of the Organizing Committee, we are honored and delighted to welcome you to the 7th International Conference on Computing, Communications and Informatics (ICACCI'18), Bangalore, India. Bangalore, officially known as Bengaluru is the capital of the Indian state of Karnataka. Bangalore is popularly known as the ‘Silicon Va...
Várias evoluções de paradigmas foram propostas nos últimos anos. Fog Computing é uma área da Ciência da Computação que está em construção e constante evolução, e em conjunto com a segurança da informação, o paradigma se torna mais confiável e seguro para as plataformas da borda do IoT. Os quesitos de segurança são de difícil alcance em ambientes com...
Os principais problemas associados à implementação e uso da gerência de redes e serviços ocorrem devido à grande quantidade de proposições, padrões e de diferentes produtos oferecidos no mercado, dificultando consideravelmente a tomada de decisão no que se refere a utilização da abordagem de gerência de redes e serviços mais adequada. Além disso, n...
Response to some questions: - What is IoT (Internet of Things) and Security for IoT? - Comment on the DDoS attack that the victim was the company Dyn, according to the ”the guardian” reported on 26 Oct. 2016. - What the really popular Internet of Things applications are right now? And in the future? - What is (will be) the interaction between IoT a...
Serviços de cloud estão sempre “ligados,” e são acessíveis globalmente, assim as “coisas” podem ser localizadas em qualquer lugar, podem ser móveis, podem transmitir dados diferentes em momentos diferentes. Serviços de cloud tem escalabilidade, o que é bom em IoT já que muitas “coisas” podem se comunicar com velocidades diferentes em momentos difer...
Informações para responder as seguintes perguntas: - Conceitue IoT (Internet das Coisas) e Segurança para IoT. - Comente sobre o ataque DDoS cuja a vítima foi a empresa Dyn, segundo divulgado no “theguardian” em 26/10/2016. - Cite e comente sobre alguns exemplos de aplicações de IoT. - Explique a interação entre IoT e Cloud (Fog e Edge). - Descreva...
These proceedings contain papers selected for presentation at the 5th International Symposium on Security in Computing and Communications (SSCC’17). SSCC aims to provide the most relevant opportunity to bring together researchers and practitioners from both academia and industry to exchange their knowledge and discuss their research findings. The s...
Composto de objetos físicos embutidos com eletrônica, software e sensores que permitem sensoriamento e controle remoto de objetos através de uma estrutura de rede. Facilita integração direta entre mundo físico e redes de comunicação. Comunicação: any TIME, any THING, any PLACE . Segurança de IoT não é apenas segurança de dispositivos! Todos os elem...
The Second International Conference on Green Communications, Computing and Technologies (GREEN 2017), held between September 10-14, 2017 in Rome, continued the inaugural event focusing on current solutions, stringent requirements for further development, and evaluations of potential directions. The event targeted to bring together academia, researc...
The Thirteenth International Conference on Wireless and Mobile Communications (ICWMC 2017), held between July 23 - 27, 2017 - Nice, France, followed on the previous events on advanced wireless technologies, wireless networking, and wireless applications.
ICWMC 2017 addressed wireless related topics concerning integration of latest technological adv...
With the rise of cloud computing, thousands of users and multiple applications have sought to communicate with each other, exchanging sensitive data. Thus, for effectively managing applications and resources, the use of models and tools is essential for the secure management of identities and to avoid compromising data privacy. There are models and...
Quality of service is one of the major concerns in cloud computing. Virtual machines (VMs) balancing techniques can help reduce service degradation in cloud computing environments. Several works have presented cloud computing balance techniques; however, only a few used the similarity between VMs and physical hosts to map VMs migrations. In additio...
The Thirteenth International Conference on Autonomic and Autonomous Systems (ICAS 2017), held between May 21 - 25, 2017 - Barcelona, Spain, was a multi-track event covering related topics on theory and practice on systems automation, autonomous systems and autonomic computing.
The main tracks referred to the general concepts of systems automation,...
In policy-based management, service providers want to enforce fine-grained policies for their resources and services. Besides the assurance of digital identity, service providers usually need personal data for evaluation of access control policies. The disclosure of personal data, also known as Personally Identifiable Information (PII), could repre...
Abstract—In policy-based management, service providers want to enforce fine-grained policies for their resources and services. Besides the assurance of digital identity, service providers usually need personal data for evaluation of access control policies. The disclosure of personal data, also known as Personally Identifiable Information (PII), co...
Autonomic Cloud Computing management requires a model to represent the elements into the managed computing process. This tutorial proposes an approach to model the load flow through abstract and concrete Cloud components. Our model has a formal mathematical background and is generic, in contrast with other proposals. It receives new Virtual Machine...
The Sixteenth International Conference on Networks (ICN 2017), held between April 23-27, 2017 in Venice, Italy, continued a series of events targeting general networking and services aspects in multi-technologies environments. The conference covered fundamentals on networking and services, and highlighted new challenging industrial and research top...
The Eighth International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD COMPUTING 2017), held between February 19-23, 2017 in Athens, Greece, continued a series of events meant to prospect the applications supported by the cloud computing paradigm and validate the techniques and the mechanisms. A complementary target was to identif...
By taking two distinct Diophantine equations with distinct large prime numbers and two different coordinates , two secret keys are generated at the same time so that two users can encrypt their messages / plaintext. Hence two sets of public key exponents with one set of private key exponents were the result of proposed algorithm.
Summary: 1 - Cloud Computing Security Monitoring 2 - Federated Identity for Cloud Computing 3 - Risk Analysis for Cloud Computing 4 - Secure Internet of Things
Autonomic Cloud Computing management requires a model to represent the elements into the managed computing process. This paper proposes an approach to model the load flow through abstract and concrete cloud components using double weighted Directed Acyclic Multigraphs. Such model enables the comparison, analysis and simulation of clouds, which assi...
The Twelfth International Conference on Wireless and Mobile Communications (ICWMC 2016), held between November 13-17, 2016 - Barcelona, Spain, followed on the previous events on advanced wireless technologies, wireless networking, and wireless applications.
ICWMC 2016 addressed wireless related topics concerning integration of latest technological...
The Eleventh International Conference on Systems and Networks Communications (ICSNC 2016), held on August 21 - 25, 2016 in Rome, Italy, continued a series of events covering a broad spectrum of systems and networks related topics.
We welcomed technical papers presenting research and practical results, position papers addressing the pros and cons of...
Cloud computing is advantageous for customers and service providers. However, it has specific security requirements that are not captured by traditional access control models, e.g., secure information sharing in dynamic and collaborative environments. Risk-based access control models try to overcome these limitations, but while there are well-known...
Abstract—Due to constant workload growth, the infrastructure used to support cloud computing (CC) environments increases in size and complexity. As a consequence of that, human administrators are not able to monitor, analyze, plan and execute actions upon the environment, seeking goals such as the environment optimization and service level agreemen...
Cloud computing offers benefits in terms of availability and cost, but transfers the responsibility of information security management for the cloud service provider. Thus the consumer loses control over the security of their information and services. This factor has prevented the migration to cloud computing in many businesses. This paper proposes...
This paper presents the implementation and tests of a flexible and extensible framework, named Order@Cloud, that improves the Virtual Machine placements of a Cloud. It receives new VMs on the Cloud and organises them by relocating their placements based on the Multiple-Objectives of the environment. These Objectives are represented by Rules, Qualif...
The Seventh International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD COMPUTING 2016), held between March 20-24, 2016 in Rome, Italy, continued a series of events targeted to prospect the applications supported by the new paradigm and validate the techniques and the mechanisms. A complementary target was to identify the open iss...