Edmundo Monteiro

Edmundo Monteiro
University of Coimbra | UC · Department of Informatics Engineering

PhD

About

411
Publications
93,546
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,087
Citations
Citations since 2017
42 Research Items
2361 Citations
20172018201920202021202220230100200300400
20172018201920202021202220230100200300400
20172018201920202021202220230100200300400
20172018201920202021202220230100200300400

Publications

Publications (411)
Article
5G networks have strict constraints regarding the services in terms of latency, reliability, and availability, which pose additional challenges to the traditional orchestration solutions, and 6G networks will increment the number of slices and services deployed over different technological domains, adding more difficulties for the orchestrator. Dis...
Article
Full-text available
In this paper, we study the impact of computational complexity on the throughput limits of the fast Fourier transform (FFT) algorithm for orthogonal frequency division multiplexing (OFDM) waveforms. Based on the spectro-computational complexity (SC) analysis, we verify that the complexity of an N -point FFT grows faster than the number of bits in...
Article
Full-text available
The Cloud-Fog-Internet of Things continuum combines different paradigms to provide connectivity and ubiquity for end-users, while also granting low latency and low jitter to cope with different challenges, including the requirements of latency-sensitive applications, such as virtual/augmented reality and online gaming. This constitutes a complex an...
Article
Full-text available
The next-generation of Industrial Automation and Control Systems (IACS) and Supervisory Control and Data Acquisition (SCADA) systems pose numerous challenges in terms of cybersecurity monitoring. We have been witnessing the convergence of OT/IT networks, combined with massively distributed metering and control scenarios such as smart grids. Larger...
Article
Full-text available
Private data is transmitted and stored online every second. Therefore, security and privacy assurances should be provided at all times. However, that is not always the case. Private information is often unwillingly collected, sold, or exposed, depriving data owners of their rightful privacy. In this paper, various privacy threats, concepts, regulat...
Chapter
A diversity of technical advances in the field of network and systems virtualization have made it possible to consolidate and manage resources in an unprecedented scale. These advances have started to come out of the data centers, spreading towards the network service provider (NSP) and telecommunications operator infrastructure foundations, from t...
Article
Full-text available
As personal data establishes itself as one of the main resources of our digital society, ways of controlling, monitoring, managing and securing personally identifiable information have become crucial. PoSeID-on is an H2020 European Union project that targets this need. In this paper, we present and discuss PoSeID-on’s risk management and personal d...
Article
Full-text available
In this work, we present an optimal mapper for OFDM with index modulation (OFDM-IM). By optimal we mean the mapper achieves the lowest possible asymptotic computational complexity (CC) when the spectral efficiency (SE) gain over OFDM maximizes. We propose the spectro-computational (SC) analysis to capture the trade-off between CC and SE and to demo...
Preprint
In this work, we present an optimal mapper for OFDM with index modulation (OFDM-IM). By optimal we mean the mapper achieves the lowest possible asymptotic computational complexity (CC) when the spectral efficiency (SE) gain over OFDM maximizes. We propose the spectro-computational (SC) analysis to capture the trade-off between CC and SE and to dem...
Article
Full-text available
Personal data is currently being used in countless applications in a vast number of areas. Despite national and international legislation, the fact is that users have little or no control over who uses their data and for what purposes, and data protection is still, in many cases, a theoretical possibility only. In this paper, we present an approach...
Article
Full-text available
In this letter, we demonstrate a mapper that enables all waveforms of OFDM with Index Modulation (OFDM-IM) while preserving polynomial time and space computational complexities. Enabling all OFDM-IM waveforms maximizes the spectral efficiency (SE) gain over the classic OFDM but, as far as we know, the computational overhead of the resulting mappe...
Article
Full-text available
The Internet of Things paradigm enables a new set of smart end-user applications. The Cloud-Fog-Mist-Internet of Things infrastructure provides communication, compute, and storage support for these applications. However, this complex, heterogeneous, and distributed landscape requires orchestration and management mechanisms in order to guarantee the...
Article
Full-text available
The Cloud to Fog continuum is a very dense and complex scenario. At the core level (Cloud) resources are vast, whilst they become scarce at the Edge (Fog). This complexity leads to the need of simulation tools in order to evaluate the performance of novel mechanisms that hardly can be tested in real scenarios. Thus, simulation represents a solution...
Preprint
In this letter we demonstrate a mapper that enables all waveforms of OFDM with Index Modulation (OFDM-IM) while preserving polynomial time and space computational complexities. Enabling \emph{all OFDM-IM waveforms} maximizes the spectral efficiency (SE) gain over the classic OFDM but, as far as we know, the computational overhead of the resulting m...
Article
It is an established fact that the security of Industrial Automation and Control Systems (IACS) strongly depends on the robustness of the underlying SCADA network protocols (amongst other factors). This becomes especially evident when considering the extent to which certain protocols, designed with poor or nonexistent security mechanisms, have led...
Article
Full-text available
Reservationless computer communication networks based on the best effort paradigm are no longer capable of providing the quality of service necessary for the new generation of computer communication services, such as voice, video and multimedia services. These new services and their users have very different communication needs, and must not be tre...
Article
The Residential Gateway (RGW) is a key device, located in the customer premises, standing between the home network and the access network. It imposes a considerable cost for the operator and constitutes a single point of failure for all the services offered to residential customers – such as Internet access, Voice over IP, IPTV and Video-on-Demand....
Article
Full-text available
Culprits’ identification by the means of suspicious pattern detection techniques from mobile device data is one of the most important aims of Mobile Forensic Data Analysis (MFDA). When criminal activities are related to entirely automated procedures such as malware propagation, predicting the corresponding behaviour is a rather achievable task. How...
Conference Paper
Full-text available
Nowadays, with an increasing amount of personal and confidential data being transmitted and stored online, entities who store and manage data need to assure certain guarantees of data privacy protection. As such, we start by presenting a state of the art review of anonymiza-tion and concealing techniques. Their characteristics and capabilities are...
Article
Full-text available
Recent developments in telecommunications have allowed drawing new paradigms, including the Internet of Everything, to provide services by the interconnection of different physical devices enabling the exchange of data to enrich and automate people's daily activities; and Fog computing, which is an extension of the well-known Cloud computing, bring...
Article
Contemporary mobile devices are the result of an evolution process where computational and networking capabilities have been continuously pushed so as to keep pace with the constantly growing workload requirements. This has allowed devices such as smartphone and tablets to perform increasingly complex tasks, up to the point of efficiently replacing...
Chapter
Advances in Soft Computing have increased the probabilities of implementing mechanisms that are able to predict human behaviour. One of the fields that benefits more from the particular improvements are Digital Forensics. Criminal activity involving smartphones shows interesting behavioural variations that led the authors to create a technique that...
Presentation
Presentation slides for the MobiTrust Workshop @Instituto de Telecomunicaçoes, Aveiro, Portugal
Conference Paper
We address the limitations the current solutions for end-to-end security in the context of IoT (Internet of Things) applications. Such limitations are related to a few important aspects that may, in practice, be crucial to support most IoT applications, particularly the lack of support of mobile sensing devices, the inadequacy of many existing sens...
Chapter
Full-text available
The discipline of Mobile Forensics (MF) has undoubtedly shown significant growth during the last few years. Research has advanced from data acquisition techniques to evidence representation methodologies, advanced evidence parsing and data analysis automation. As technology evolves and functionalities of mobile devices extend to other environments...
Article
Full-text available
Wireless devices are widely used to monitor and control multiple groups within the context of machine-to-machine applications. The Constrained Application Protocol provides communication capabilities for applications that demand periodic monitoring of multiple groups. Because of the energy constraints of the devices used, a key challenge is to exte...
Book
The book gathers contributions presented at the IFIP/IEEE Symposium on Integrated Network and Service Management (IM 2017) held in Lisbon, Portugal.
Conference Paper
Full-text available
Over the recent years, control and sensor systems used for IACS (Industrial Automation and Control Systems) have become more complex, due to the increasing number of interconnected distributed devices, sensors and actuators. Such components are often widely dispersed in the field – this is the case for micro-generation (wire-to-water generation, so...
Conference Paper
Full-text available
As Supervisory Control and Data Acquisition (SCADA) and Industrial and Automation Control System (IACS) architectures became more open and interconnected, some of their remotely controlled processes also became more exposed to cyber threats. Aspects such as the use of mature technologies and legacy equipment or even the unforeseen consequences of b...
Conference Paper
The Internet of Things comprises a network of physical objects, like sensors and actuators, collecting and exchanging data. Given the importance of the information exchanged in these environments, the communication infrastructure becomes a critical point that needs to be managed optimally, while providing high-performance levels to end users. To gu...
Article
Full-text available
In recent years, Supervisory Control and Data Acquisition (SCADA) Industrial Control Systems (ICS)—systems used for controlling industrial processes, power plants, or assembly lines—have become a serious concern because of security and manageability issues. While the introduction of virtualization technologies has been instrumental in helping ICT i...
Article
Full-text available
Modern Programmable Logic Controllers (PLCs) are pervasive components in Industrial Control Systems (ICS) such as Supervisory Control and Data Acquisition (SCADA), designed to control industrial processes autonomously or as part of a distributed system topology. Its success may be explained by its robustness and reliability, being one of the most e...
Conference Paper
Full-text available
In recent years, Supervisory Control and Data Acquisition (SCADA) Industrial Control Systems (ICS) – a kind of systems used for controlling industrial processes, power plants or assembly lines – have become a serious concern because of security and manageability issues. Years of air-gaped isolation, the increased coupling of ICS and Information and...
Article
Nowadays, technology is such an integral part of our lives that the dependency on its benefits is growing faster than ever. With the arrival of the paradigms of smart cities and the Internet of Things, citizens are able to improve their quality of life. Given that sensors and actuators deployed in smart cities usually have limited resources, today,...
Article
New services and applications become part of our daily activities as we evolve into new solutions supported by cutting-edge paradigms, like the Internet of Things and Smart Cities. In order to properly achieve the benefits theoretically provided by these models, new kinds of services must be designed. These new services have special requirements, a...
Article
Mobile Edge Computing enables the deployment of services, applications, content storage and processing in close proximity to mobile end users. This highly distributed computing environment can be used to provide ultra-low latency, precise positional awareness and agile applications, which could significantly improve user experience. In order to ach...
Conference Paper
Full-text available
End-to-end communications with Internet-integrated sensing devices will contribute to the enabling of many of the envisioned IoT applications. Communication technologies with this purpose are currently being designed based on the 6LoWPAN adaptation layer, and of particular interest is CoAP (Constrained Application Protocol). The support of security...
Conference Paper
With a boom in the usage of mobile devices for traffic-heavy applications, mobile networks struggle to deliver good performance while saving resources to support more users and save on costs. In this paper, we propose enhanced strategies for the preemptive migration of content stored in Information-Centric Networking caches at the edge of LTE mobil...
Chapter
Large-Scale Highly-Dense Networks have been deployed in different application domains of Internet-of-Things for accurate event-detection and monitoring. Due to the high density and large scale, the nodes in these networks must perform some essential communication roles, namely sensing, relaying, data-fusion, and data-control (aggregation and replic...
Chapter
Public Protection and Disaster Relief (PPDR) agencies in European member states currently rely on digital Private Mobile Radio (PMR) networks for mission critical operations. PMR networks are based on two main standards for Europe: Terrestrial Trunked Radio (TETRA) and TETRAPOL. These networks provide secure and resilient mobile voice services, as...
Article
Full-text available
Currently, there are several ongoing efforts for the definition of new regulation policies, paradigms, and technologies aiming a more efficient usage of the radio spectrum. In this context, cognitive radio (CR) emerges as one of the most promising players by enabling the dynamic access to vacant frequency bands on a non-interference basis. However,...
Conference Paper
Machine-to-Machine (M2M) communication is an emerging paradigm for the next generation of sensing and actuating systems. Energy harvesting technologies applied in sensor and actuator devices must be considered by the communication solutions in order to achieve energy-efficient M2M communication. This paper addresses the problem of regulating the en...
Data
Full-text available
Nos últimos anos surgiu uma nova geração de aplicações baseadas em Voice-over-IP (VoIP), que oferecem serviços de comunicações de voz na Internet. Fornecidas maioritariamente como serviços over-the-top, e usando normas como o SIP ou mecanismos proprietários (tais como Skype, Google Talk e Yahoo! Voice), estas aplicações ganharam grande popularidade...
Article
Full-text available
Critical infrastructure (CI) services are constantly consumed by the society and are not expected to fail. A common definition states that CIs are so vital to our society that a disruption would have a severe impact on both the society and the economy. CI sectors include, amongst others, electricity, telecommunication and transport. CIs can be mutu...
Conference Paper
Full-text available
Despite being a relatively recent development, the SDN paradigm has already challenged the established network design, management and operation concepts. SDN is the result of a number of studies and ideas on network programming, oriented towards the improvement of the traditional network functionality and management, due to its unique levels of fle...
Article
Full-text available
The Internet of Things (IoT) introduces a vision of a future Internet where users, computing systems and everyday objects possessing sensing and actuating capabilities cooperate with unprecedented convenience and economical benefits. As with the current Internet architecture, IP-based communication protocols will play a key role in enabling the ubi...
Article
From an internet service provider's (ISP) perspective, modern broadband access networks pose significant and ever increasing challenges in terms of security management. The growing number of permanently connected home networks, with a myriad of poorly managed devices, imposes significant security risks not only to the domestic customers, unable to...
Chapter
Critical Infrastructures (CIs) such as power distribution are referred to as "Critical" as, in case of failure, the impact on society and economy can be enormous. CIs are exposed to a growing number of threats. ICT security plays a major role in CI protection and risk prevention for single and interconnected CIs were cascading effects might occur....
Conference Paper
Full-text available
SIEM (Software Information and Event Management) systems are becoming increasingly commonplace in scenarios as diverse as ICT environments or Critical infrastructures, providing the means to process and analyse multiple distributed sources of information and events, for auditing or security purposes. The main component of its architecture is the co...
Article
Full-text available
Sumário Este artigo descreve o desenvolvimento do protótipo de um encaminhador, em plataforma FreeBSD, capaz de fornecer Qualidade de Serviço (QoS) a tráfego IP. O protótipo baseia-se no modelo Differentited Services e é suportado pela métrica de QoS desenvolvida no Laboratório de comunicações Telemáticas (LCT) do DEI 1 .
Article
Cooperation among service providers, network providers, and access providers in the Internet allows the creation of new services to offer to customers that are in other domains, thus increasing revenue. However, the Internet heterogeneous environment, where each provider has its own policies, infrastructure and business goals, hinders the deploymen...
Article
Opportunistic cognitive radio (CR) allows unlicensed wireless nodes to dynamically locate and access spectrum holes, i.e., licensed channels that are not being used by their incumbent users. In this context, sensing the spectrum is a key issue and performing it on a data frame basis maximizes the protection of incumbent users. Additionally, when th...
Article
Full-text available
The energy resources of Machine-to-Machine (M2M) devices need to last as much as possible. Data aggregation is a suitable solution to prolong the network lifetime, since it allows the devices to reduce the amount of data traffic. In M2M systems, the M2M platform and the Constrained Application Protocol (CoAP) enable multiple entities to send concur...
Article
Full-text available
Network lifetime is the time interval in which the nodes are operational. Considering that machine-to-machine (M2M) devices have limited energy resources, an important challenge in M2M communications is to prolong the network lifetime. The constrained application protocol (CoAP) supports multi-target monitoring applications in M2M communications, a...
Conference Paper
Public Protection and Disaster Relief (PPDR) agencies increasingly depend on specialized communications systems for supporting critical activities such as law enforcement operations, fire fighting, response to traffic accidents and medical emergencies, crowd control in large events, anti-terrorism, disaster relief and public protection in general....
Chapter
The Residential Gateway (RGW) is a key device, located on the customer premises, that stands between the home network and the access network. It imposes a considerable cost for the NSP and constitutes a single point of failure for all the services offered to residential customers – such as Internet access, VoIP, IPTV and Video-on-Demand. As such, t...
Chapter
Critical Infrastructures (CIs) such as power distribution are referred to as “Critical” as, in case of failure, the impact on society and economy can be enormous. CIs are exposed to a growing number of threats. ICT security plays a major role in CI protection and risk prevention for single and interconnected CIs were cascading effects might occur....
Conference Paper
Full-text available
During the last decade, smartphones have shown increased computational and networking capabilities. With the high bandwidth supported by Fourth Generation/ Long-Term Evolution (4G/LTE) technology, end-users will enjoy improved quality of communications, especially concerning data transfer services [1] in commercial and dedicated, Public Protection...
Technical Report
Full-text available
Real-time multimedia sessions are contributing to enhance our life experience and are expected to be among the most important applications in future generation networks. The management of those sessions for fixed and mobile users with Quality of Experience (QoE) support is an important key to attract and keep customers, while increasing the profits...
Chapter
This chapter addresses the delivery of cloud-based content to home ecosystems. It provides a broad perspective on key challenges, industry practices, and recent trends. Cloud computing is the result of several technological advances, such as virtualization and the pervasive availability of broadband network access, enabling a multitude of new servi...