
Cristiano Antonio SouzaFederal University of Santa Catarina | UFSC · Departamento de Informática e Estatística
Cristiano Antonio Souza
Phd student
About
14
Publications
9,610
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
96
Citations
Citations since 2017
Introduction
Graduated in Computer Science from the State University of Western Paraná (2015) and master's degree in Electrical and Computer Engineering from the State University of Western Paraná (2018). He is currently a doctoral student of the Graduate Program in Computer Science at the Federal University of Santa Catarina. Participates in research groups: Information Security, Network and Systems Research Group (CNPq-UFSC); and Computational Security Research Group (CNPq-UNIOESTE). Cristiano Antonio Souza currently works at the Departamento de Informática e Estatística, Federal University of Santa Catarina. Has experience in Computer Science, focusing on Computer Security and Artificial Intelligence.
Additional affiliations
July 2015 - August 2017
Itaipu Hydroelectric
Position
- Intern
Education
February 2018 - March 2022
March 2016 - January 2018
February 2012 - February 2016
Publications
Publications (14)
We introduce a lightweight specification-based internal intrusion detection system for smart environments monitoring IoT devices directly in fog computing layer, solving latency issues and being able to protect fog and above layers from denial of service (DoS) attacks. We further investigate different approaches to mitigate an attack considering no...
Authentication of restricted memory devices presents significant problems since memory consumption is high in mutual authentication using cryptographic protocols in IoT environments. The development of a multi-factor mutual authentication method that can be used in fog and cloud computing remains a challenge, according to previous studies. The pres...
a document portfolio for threat model and multi-factor authentication areas that represents the areas' state-of-art; • a list of the main characteristics of multi-factor authentication researches from the portfolio; • a list of the main threats to multi-factor authentication obtained from the state-of-art. A B S T R A C T This work reports that the...
obtaining a sufficiently representative dataset of the authentication and threat model area to support future research. • a set of statistical analyzes of publication data, such as sources, publication by time, and most cited publications. • analysis of the top ten articles with the highest number of citations of the entire period and classificatio...
Currently, the Internet of Things is spreading in all areas that apply computing resources. An important ally of the IoT is fog computing. It extends cloud computing and services to the edge of the network. Smart environments are becoming real and possible through IoT and fog computing. However, they are not free from security threats and vulnerabi...
Due to Internet of Things devices resource limitations, security often does not receive enough attention. Intrusion detection approaches are important for identifying attacks and taking appropriate countermeasures for each specific threat. This work presents a two-step approach for intrusion detection and identification. The first step performs a t...
The Internet of Things (IoT) systems have limited resources, making it difficult to implement some security mechanisms. It is important to detect attacks against these environments and identify their type. However, existing multi-class detection approaches present difficulties related to false positives and detection of less common attacks. Thus, t...
Authentication of restricted memory devices presents significant problems since memory consumption is high in mutual authentication using cryptographic protocols in IoT environments. The development of a multi-factor mutual authentication method that can be used in fog and cloud computing remains a challenge, according to previous studies. The pres...
In the Internet of Things (IoT) systems, information of various kinds is continuously captured, processed, and transmitted by systems generally interconnected by the Internet and distributed solutions. Attacks to capture information and overload services are common. This fact makes security techniques indispensable in IoT environments. Intrusion de...
Apresentação Exame de Qualificação de Doutorado
Texto do Exame de Qualificação de Doutorado
The Internet of Things and Fog Computing are technologies currently used in many areas. They can be applied to provide a residential automation environment, for example, fire alarm applications, gas leak alarms, among others. Security-related searches for these fog-based environments are still in the early stages. Also, the fact that these environm...
Projects
Project (1)
In the “first part” will be considered the authentication of devices with restricted memory that still presents significant problems, since the memory consumption is high in the mutual authentication using cryptographic protocols. According to previous studies, the development of an efficient method to perform mutual authentication, with multifactor, remains a challenge for IoT-Fog-Cloud environments. The present work aims to improve a multifactor mutual authentication method, using a variable and adjustable response time, challenge and nonce response function. With these factors, the method can be improved for Fog and Cloud Computing contexts. Future results will be compared with evaluations carried out in related works and in our previous works, seeking to obtain a satisfactory result in terms of energy consumption and processing and communication costs. We will also use the Proverif tool and do an informal analysis to provide the security assessment.
In the “second part”, in Internet of Things (IoT) systems, information of various types is continuously captured, processed and transmitted by systems usually interconnected by the Internet and distributed solutions. Attacks to capture information and overload services are common. This fact makes security techniques indispensable in IoT environments. Intrusion detection is one of the vital security points, designed to identify attack attempts. The characteristics of IoT devices make it impossible to apply these solutions in this environment. Furthermore, existing anomaly-based methods for multiclass detection do not have acceptable accuracy. An intrusion detection architecture will be proposed that will operate in the fog computing layer (Fog), aiming to classify events into specific types of attacks or non-attacks, for the execution of countermeasures. We will improve a hybrid method of binary classification called DNN-kNN. The approach will be based on Deep Neural Networks (DNN) and the k-Nearest Neighbor (kNN) algorithm. In the experiments, the public databases NSL-KDD and CICIDS2017 will be used in order to obtain greater precision about classical machine learning approaches and recent advances in intrusion detection for IoT systems.
In the “third part” we will improve an Autonomic System to manage energy consumption in Internet of Things (IoT) and Fog Computing devices. The proposal will introduce advanced orchestration mechanisms to manage dynamic duty cycles for extra energy savings. The solution will work by adjusting the cycles as “Home (being at home)” and “Away (being away from home)” change states based on contextual information such as environmental conditions, user behavior, behavior variation, usage regulations energy and network resources, among others. A performance evaluation will be carried out through a proof of concept, considering average energy savings when increasing a scheduling system, and variables of long sleep cycles. We will also aim to promote autonomous management as a solution to develop more efficient buildings for energy use and smart cities, contributing to generate more sustainability.