Juanjo Unzilla

Juanjo Unzilla
  • University of the Basque Country

About

40
Publications
5,152
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
452
Citations
Introduction
Skills and Expertise
Current institution
University of the Basque Country

Publications

Publications (40)
Article
Blockchain stands as a crucial technology capable of enhancing transparency, security, and efficiency within various sectors. Particularly in Industry 4.0, blockchains can be employed to monitor the movement of goods and materials across the supply chain, ensuring data integrity, transparency, immutability, accountability, and industrial process in...
Article
Full-text available
The rapid emergence of new applications and services, and their increased demand for Quality of Service (QoS), have a significant impact on the development of todays communication networks. As a result, communication networks are constantly evolving towards new architectures, such as the 6th Generation (6G) of communication systems, currently being...
Article
Full-text available
Quick handling of link failures remains a challenging issue in current communication networks, although it is crucial to many routing algorithms. Link failures are the leading cause of packet losses and delays, therefore, failure recovery is tied to stringent requirements for certain services, such as the sub-50 millisecond completion time for carr...
Chapter
Industry 4.0 integrates IoT and robotics to create smart factories that work together seamlessly. However, this integration requires secure and efficient data management systems. Blockchain is a distributed ledger technology that stores data in a secure and transparent manner via cryptography mechanisms. Since the release of Bitcoin, it has gained...
Thesis
Full-text available
Industry 4.0, also recognized as the fourth industrial revolution, symbolizes an innovative phase of manufacturing. It is driven by emerging technologies like Artificial Intelligence (AI), the Internet of Things (IoT), Big Data, advanced robotics, augmented reality, cloud computing, and cybersecurity. The prime focus is to digitally transform and i...
Article
Full-text available
Citation: Stefanescu, D.; Galán-García, P.; Montalvillo, L.; Unzilla, J.; Urbieta, A. Industrial Data Homogenization and Monitoring Scheme with Blockchain Oracles. Smart Cities 2023, 6, 263-290. https:// Abstract: Research efforts on Distributed Ledger Technologies (DLTs) for industrial applications have constantly been increasing over the last yea...
Chapter
The use of Distributed Ledger Technologies (DLTs) in the field of Industry 4.0 has been constantly increasing over the last years. In a complete Industry 4.0 ecosystem there are multiple smart factory clusters that belong to one or more companies and openly interact with their business partners, clients and suppliers. In such a complex ecosystem, m...
Article
Full-text available
The Internet of Things (IoT) has become an essential part of our society. IoT devices are used in our houses, hospitals, cars, industry, etc., making our lives easier. Nonetheless, there are a number of serious concerns about security, privacy and performance issues in IoT. It has been proven that the aforementioned issues are strictly related to t...
Chapter
Full-text available
The Industrial Internet of Things (IIoT) aims to greatly improve the existing production procedures, enhancing customer experiences, reducing costs and increasing efficiency. IIoT will make a significant impact on existing business models in several areas. However, IIoT has several issues related to the security of the information and the excessive...
Article
Full-text available
Research and education networks (RENs) worldwide, attracted by the benefits of softwaredefined networking (SDN) for services involving traffic engineering (TE) such as bandwidth on demand (BoD), have started to include SDN in their network evolution plans. BoD allows users to request end-toend connectivity services of known duration with a guarante...
Article
Full-text available
The aim of this article is to present an architecture to support reconfigurable multimedia services for a practical emergency environment use case of rescue operations. Specifically, radio communication and video surveillance services are provided by means of a small device carried by a mobile vehicle. This solution is validated by implementing a d...
Chapter
Software Defined Networking (SDN) is a new network paradigm that decouples the control from the data plane in order to provide a more structured approach to develop applications and services. In traditional networks the routing of flows is defined by masks and tends to be rather static. With SDN, the granularity of routing decisions can be downscal...
Conference Paper
La virtualización de funciones de red está cada vez más presente en el portfolio de soluciones de integradores y fabricantes. Estas soluciones en gran medida propondrán algunos o todos los elementos reflejados en la arquitectura canónica promovida por ETSI [1] (European Telecommunications Standards Institute). De manera simplificada: Una infraestru...
Conference Paper
The connected vehicle is becoming a reality. Internet access onboard will indeed increase road safety and security thanks to the cooperative networking that it is expected among vehicles, roadside units and the Internet. Moreover, this connectivity will bring innovative driving assistance services and infotainment alike services for end users. This...
Article
Full-text available
Emerging communication services in the intelligent transportation systems (ITS) scenario have recently considered the provision of Internet services because this fact will aid in safety purposes and will offer a wide scope of applications to end users. Consequently, and considering the ITS scenario a specific mobile networking context (several conn...
Article
The telecommunications landscape has been undergoing a major shift in recent years. Initially Software Defined Networking (SDN), and then Network Function Virtualization (NFV) have opened up new ways of looking at the increasingly demanding service provider scenario. The description of the service to be provided will be a key point determining the...
Article
This article presents the progressive evolution of NFV from the initial SDN-agnostic initiative to a fully SDN-enabled NFV solution, where SDN is not only used as infrastructure support but also influences how virtual network functions (VNFs) are designed. In the latest approach, when possible, stateless processing in the VNF shifts from the comput...
Conference Paper
The possibility to deploy telecommunication services based on the availability of a fully flow-aware network is an appealing possibility. Concepts like Network Service Chaining and Network Function Virtualization expect the information to be manageable at the flow level. But, for this concept to be available for the development of user-centric appl...
Article
With the development of solutions like 6LoWPAN, the implementation of IP technology in sensor devices is already a reality. Therefore, sensors can be natively integrated in the Internet, becoming globally addressable by any other Internet-connected party. Despite the huge potential of this approach, it also gives place to new threats, being one of...
Article
The introduction of communication services in the demanding ITS scenarios strongly relies on the existence of technologies that enable mobility and security. ITS related standardization bodies, mainly ISO and ETSI, are actively producing and developing new specifications in this regard. In this paper, we study those ITS standards related to securit...
Article
When there is a need to compare the characteristics of several similar global communications systems, security is often an important factor to consider in the comparison. However, in most situations it is difficult to deduce whether a system is more secure than other; and it is even more difficult to deduce how much more secure a system is compared...
Conference Paper
Due to the rapid growth of computer networks and advances in cryptography, Electronic Voting Systems are becoming a real option for voters. These systems must fulfil requirements such as accuracy, invulnerability, privacy, verifiability, convenience, flexibility and mobility, protected by the required security schemes. Those requirements guarantee...
Article
Full-text available
This article presents Demotek, a multi-agent prototype for an electronic voting system based on optical character recognition technology. Trade-offs in voter training, ease of use, security, and coercion across various systems are considered for the purpose of recognizing achievable improvements. Based on the use of N-version programming techniques...
Conference Paper
Systems based on the use of watermarking techniques are seen in recent times as the most interesting solutions to provide means of protecting intellectual property rights in electronic commerce with digital contents environments. A key aspect of this secure e-commerce environment is security. It is important to be able to evaluate and to know the s...
Article
Full-text available
In this paper, we describe a commercial service that will use distributed resources, such as storage or bandwidth, in a cooperative effort. We name this service 'durable storage'. This service is able to guarantee the existence of the data it contains in 'any circumstance' at 'any time'. Although the solution is based on a P2P paradigm, we use a ce...
Conference Paper
Full-text available
In this article we describe a commercial service that will use distributed resources, such as storage or bandwidth, in a cooperative effort. We name this service "durable storage". This service is able to guarantee the existence of the data it contains in "any circumstance" at "any time". Although the solution is based on a P2P paradigm, we use a c...
Conference Paper
The ease and convenience that electronic commerce provides, especially when multimedia material is involved, is helping the growth in the number and volume of electronic transactions through the Internet. But this new type of trading operations has highlighted new problems related to copyright protection. Watermarking seems to be an interesting app...
Article
Full-text available
En este artículo se va a presentar un trabajo en curso, en el que se plantean varios esquemas para la comercialización de servicios basados en el paradigma Grid (en la acepción más amplia, el uso de recursos distribuidos de una manera colaborativa) diseñados para ser ofrecidos con la participación de un ISP. Se estudiarán las características que ti...
Article
Public Key Infrastructures (PKIs) are considered the most suitable system to provide basic security services through digital certificates use. Nevertheless, traditional way of operation, based on web interface and asynchronous interactions, as well as the cost and difficulty of registration processes, have caused their replacement by other systems...
Article
Full-text available
This article describes an activity and time management tool that allows any member of a virtual learning environment to have their timetables and activities planned or scheduled in such a way, that deadlines and personal preference criteria are both met. First of all, a general overview of the day-to-day difficulties that students, particularly dis...
Conference Paper
This paper presents a new method for signing digital images using high frequency components to guide the way digital watermarks are inserted in the image. Although this is not a new idea, we implement it working in the spatial domain, which means a more efficient algorithm and less processing time. We use a user's configurable line segment chain to...
Article
Nowadays digital records are the heart of every business. From e-commerce transactions with customers and suppliers to the accumulated intellectual property of R&D departments, a business depends on the integrity of its corporate data. This paper shows the design and implementation of a digital notary system. This system enables any client to notar...
Article
This paper presents a watermarked image distribution service. We analyse some of the existing problems and explain our method, which uses blind signature techniques to avoid possible frauds when dealing with watermarked images. This work will be partially used as the basis of a future multimedia content's commerce platform.
Article
Full-text available
This article describes the development of an activity and time management tool specifically tuned to satisfy needs associated with distant learning techniques in virtual environments. Therefore, this tool's main objective is obtaining a software able to perform an automatic scheduling of planned tasks, i.e., offer to its end-users an easy way to ma...

Network

Cited By