Marivi Higuero

Marivi Higuero
  • University of the Basque Country

About

70
Publications
22,655
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
630
Citations
Current institution
University of the Basque Country

Publications

Publications (70)
Article
Full-text available
The rapid emergence of new applications and services, and their increased demand for Quality of Service (QoS), have a significant impact on the development of todays communication networks. As a result, communication networks are constantly evolving towards new architectures, such as the 6th Generation (6G) of communication systems, currently being...
Article
Full-text available
Quick handling of link failures remains a challenging issue in current communication networks, although it is crucial to many routing algorithms. Link failures are the leading cause of packet losses and delays, therefore, failure recovery is tied to stringent requirements for certain services, such as the sub-50 millisecond completion time for carr...
Article
Full-text available
To boost data spaces and benefit from the great opportunities that they present, data sovereignty must be provided by Distributed Usage Control (DUC). Assuming that DUC will be managed by implementing and enforcing policies, notable efforts have already been undertaken in the context of Access Control (AC) regarding policy analysis due to the impac...
Article
Data exchange between organizations is becoming an increasingly significant issue due to the great opportunities it presents. However, there is great reluctance to share if data sovereignty is not provided. Providing it calls for not only access control but also usage control implemented in distributed systems. Access control is a research field wh...
Preprint
Full-text available
This paper proposes a framework for integrating data plane (DP) acceleration within the Network Functions Virtualization (NFV) architecture. Data plane programming (DPP) proves to be beneficial for NFV environments, as it provides full packet forwarding flexibility through the use of self-designed algorithms. Additionally, DPP provides high-perform...
Article
The growing markets of Cloud services and IoT platforms have dramatically raised system flexibility and deployment options. However, increasing complexity and dependency on third-party providers make it difficult to assess the security and privacy levels that distributed systems can offer to their users. In the last years, machine-readable Service...
Article
The market prediction for network deployments has positioned Software-Defined Networks (SDN) as the first of the options for changing local, transport, or cloud networks. Since the OpenFlow protocol gained traction and evolved in the last versions, the possibilities for expanding network capabilities to deploy custom services have risen considerabl...
Article
Full-text available
Although the risk assessment discipline has been studied from long ago as a means to support security investment decision-making, no holistic approach exists to continuously and quantitatively analyze cyber risks in scenarios where attacks and defenses may target different parts of Internet of Things (IoT)-based smart grid systems. In this paper, w...
Conference Paper
Full-text available
Data sharing offers a lot of benefits in sectors like manufacturing, food, smart grids, healthcare, etc. not only for data providers, but also, for consumers. Despite this fact, in distributed systems if trust among participants and data sovereignty are not provided, data providers are reluctant to exchange their data, especially when referring to...
Conference Paper
Today, government institutions, academics, companies and citizens have access to a large amount of data from different providers and technological sources. Moreover, a good use of that data can provide them a lot of benefits related to the development of quality services. Nevertheless, data exchange generates mistrust especially when talking about...
Article
Full-text available
Since the appearance of OpenFlow back in 2008, Software-Defined Networking (SDN) has gained momentum. Although there are some discrepancies between the standards developing organisations working with SDN about what SDN is and how it is defined, they all outline Traffic Engineering (TE) as a key application. One of the most common objectives of TE i...
Conference Paper
Geant, the pan-European Research and Education Network (REN) is working on a Software-Defined Networking (SDN) solution to improve the provisioning of the Bandwidth on Demand (BoD) service. The SDN-based solution will integrate with the current provisioning tool, AutoBAHN, to add support for OpenFlow domains. One of the main benefits of this approa...
Conference Paper
The connected vehicle is becoming a reality. Internet access onboard will indeed increase road safety and security thanks to the cooperative networking that it is expected among vehicles, roadside units and the Internet. Moreover, this connectivity will bring innovative driving assistance services and infotainment alike services for end users. This...
Article
Full-text available
Emerging communication services in the intelligent transportation systems (ITS) scenario have recently considered the provision of Internet services because this fact will aid in safety purposes and will offer a wide scope of applications to end users. Consequently, and considering the ITS scenario a specific mobile networking context (several conn...
Conference Paper
Railway signalling systems play a key role in the intelligent rail transportation. These systems rely on underlying communication networks that carry state information and commands between the control centre and the train fleet. These networks are currently involved in a migration process towards IP technology. Within this migration, the Multiproto...
Conference Paper
This paper presents the setup of a demonstrator based on Multipath TCP protocol to provide a multi bearer—WiFi and WiMAX— and resilient agnostic layer to support train-to-ground IP communication. The adaptable communication and resilient architecture consists of three main blocks: an Acquisition System, a Detection System and a Multipath Communicat...
Article
Full-text available
The evolution of the railway sector depends, to a great extent, on the deployment of advanced railway signalling systems. These signalling systems are based on communication architectures that must cope with complex electromagnetical environments. This paper is outlined in the context of developing the necessary tools to allow the quick deployment...
Conference Paper
The DynPaC (Dynamic Path Computation) framework has been designed to provide resilient on-demand Layer 2 services with bandwidth constraints in Software-Defined Networks, more specifically in Open Flow networks. It has been implemented using the Open Daylight platform as base Open Flow controller, which has been extended with custom modules that pr...
Article
IP-enabled sensors can be globally addressable by any Internet-connected entity, and therefore, their protection presents different challenges than that of traditional sensors, as they are subject to any potential attacker in the Internet. For this reason, specific security protocols must be developed to address the security requirements of IP-enab...
Article
Full-text available
The upcoming development of the Internet of Things IoT envisions IP-enabled pacemakers and ICDs, giving place to a completely new scenario in the field of remote monitoring of patients implanted with these devices. Apart from the costs saved thanks to the reduction of in-clinic visits, this new approach will help improving the quality of life of ch...
Article
The introduction of communication services in the demanding ITS scenarios strongly relies on the existence of technologies that enable mobility and security. ITS related standardization bodies, mainly ISO and ETSI, are actively producing and developing new specifications in this regard. In this paper, we study those ITS standards related to securit...
Article
In this paper, we present an innovative approach to solving the mobility management problem in the context of professional private broadband networks in the vehicular scenario. These heterogeneous communication networks are commonly deployed and managed by mission-critical organisations with the aim of supporting their specific and highly demanding...
Article
Full-text available
One of the major concerns in an Intelligent Transportation System (ITS) scenario, such as that which may be found on a long-distance train service, is the provision of efficient communication services, satisfying users’ expectations, and fulfilling even highly demanding application requirements, such as safety-oriented services. In an ITS scenario,...
Article
The authors present Ladon, an enhanced version of Kerberos which extends the original protocol with authorisation capacity and relaxes the necessity of clock synchronisation by adding to the protocol special limited-lifetime nonces. This way, although all entities need timers, only the clocks of the two servers that constitute the key distribution...
Article
Internet connectivity in the ITS context is a flourishing demand that has to be covered by efficient information and communication technologies. Thanks to the provision of this connectivity, not only end users will profit from communication services, but also services for controlling the operation of the vehicle will benefit from the Internet conne...
Article
NEtwork MObility Basic Support (NEMO BS) is a standardized protocol for managing the mobility of a set of nodes that move together as a whole while having continuous connectivity to the Internet through one or more Mobile Routers (MRs). Because it is based on Mobile IPv6 (MIPv6), it inherits the properties of MIPv6, such as the use of IPsec. Howeve...
Article
The proposals suggested so far can be can be classified in two different categories: on the one hand, NEMO solutions that consider MIPv6 as the base host mobility management protocol, and on the other hand, solutions that consider alternative base host mobility management protocols like SIP, LIN6, or HIP. Besides, a taxonomy on MIPv6 based NEMO pro...
Conference Paper
With the goal of solving shortcomings of MIPv6, alternative protocols such as HIP have been proposed by the research community. In the same way as for MIPv6, solutions to cover NEMO scenarios based on HIP have been worked out. However, there is little agreement on which the best way is to handle NEMO scenarios when using HIP. In this work we analyz...
Article
Covering NEtwork MObility (NEMO) scenarios based on end-to-end mobility management protocols such as the Host Identity Protocol (HIP) is not straightforward. However, it has been demonstrated that HIP based NEMO solutions outperform NEMO Basic Support (NEMO BS), hence, HIP is being considered also for addressing NEMO scenario necessities. In this w...
Conference Paper
The provision of NEMO support based on an end-to-end protocol presents manageability challenges that are usually overcome delegating the signaling rights to the MR. In addition, whether the protocol is focused on establishing security associations, how these are rekeyed through a proxy-based process with no security threats should be solved. In thi...
Chapter
This chapter shows the most significant approaches developed so far for the distribution of digital contents with copyright protection, highlighting their most interesting features. These proposals may be classified into two categories: on the one hand systems that try to prevent unauthorized uses of the contents, and on the other hand systems whos...
Article
Together with the IMO's future navigation system implementation strategy, the e-navigation, wireless access technologies are proliferating on the maritime scenario, covering last mile communications. In the near future, we foresee that communication technologies will coexist and will be available in overlapping areas through the maritime last mile....
Article
JISBD 2008 This number of the journal IEEE América Latina includes a selection of the best papers presented at the 13th Conference on Software Engineering and Databases, organized in Gijón (Spain) in October, 7 to 10, 2008. TELECOM I+D 2008 The present Edition of IEEE Latin America Transactions contains a selection of the best papers presented in t...
Article
Today, collaboration is considered a way of improving efficiency and quality of work. This concept is spreading quickly over the technological world, resulting in the organisation of ubiquitous and distributed collaborative environments, which try to provide high-level services based on the interaction among different basic modules. A typical examp...
Article
The present Edition of IEEE Latin America Transactions contains a selection of the best papers presented in the 18th Edition of the Telecom I+D Conference that was held the 29, 30 and October 31, 2008 in the Guggenheim Museum of Bilbao (Spain). For almost 20 years, the Telecom I+D (telecommunications R&D) conferences have become the reference event...
Conference Paper
Advances of diverse wireless access technologies are defining the trends of future wireless networks, named Next Generation Wireless Networks (NGWN), where several access technologies will coexist and devices will be equipped with different network interfaces, in order to take advantage of each access technology. In NGWN communication maintenance i...
Article
Broadband service delivery has experienced a great evolution due to significant technological advances, which have favored the appearance of new business models. In this context, multi-play services denote the provisioning of several broadband services over a single broadband connection. In current deployments, there are a concrete number of servic...
Article
When there is a need to compare the characteristics of several similar global communications systems, security is often an important factor to consider in the comparison. However, in most situations it is difficult to deduce whether a system is more secure than other; and it is even more difficult to deduce how much more secure a system is compared...
Article
This article presents a telecommunication network architecture based on mobile worldwide interoperability for microwave access (WiMAX) technology that fulfills the telecommunications needs in the railway domain.
Conference Paper
WiMAX evolution is expected to go through Wireless broadband last mile access, backhaul solutions ending with handset integration. This paper outlines the challenging scenario WiMAX networks face when deploying mobile Internet applications, including the most demanding in terms of latency and data rate: the video applications. The proposed strategy...
Article
Full-text available
A great amount of the research being carried out in the transportation industry, and motivated by public administrations, is focused on safety and sustainability issues. European Union has encouraged the interoperability between the different European railway signalling systems with the design and standardization of the ERTMS (European Rail Traffic...
Conference Paper
The recent progresses in mobile telecommunications technologies have allowed railway telecommunications technology to go a step forward, and, in the same way, the railway control systems. In this sense, while the mobile telecommunications technology evolved from the first generation of analogue mobile communication systems to what is known today as...
Conference Paper
Systems based on the use of watermarking techniques are seen in recent times as the most interesting solutions to provide means of protecting intellectual property rights in electronic commerce with digital contents environments. A key aspect of this secure e-commerce environment is security. It is important to be able to evaluate and to know the s...
Article
Full-text available
In this paper, we describe a commercial service that will use distributed resources, such as storage or bandwidth, in a cooperative effort. We name this service 'durable storage'. This service is able to guarantee the existence of the data it contains in 'any circumstance' at 'any time'. Although the solution is based on a P2P paradigm, we use a ce...
Conference Paper
Full-text available
In this article we describe a commercial service that will use distributed resources, such as storage or bandwidth, in a cooperative effort. We name this service "durable storage". This service is able to guarantee the existence of the data it contains in "any circumstance" at "any time". Although the solution is based on a P2P paradigm, we use a c...
Conference Paper
The ease and convenience that electronic commerce provides, especially when multimedia material is involved, is helping the growth in the number and volume of electronic transactions through the Internet. But this new type of trading operations has highlighted new problems related to copyright protection. Watermarking seems to be an interesting app...
Article
Full-text available
En este artículo se va a presentar un trabajo en curso, en el que se plantean varios esquemas para la comercialización de servicios basados en el paradigma Grid (en la acepción más amplia, el uso de recursos distribuidos de una manera colaborativa) diseñados para ser ofrecidos con la participación de un ISP. Se estudiarán las características que ti...
Article
Full-text available
This paper shows authors' experience with students that learn how to administer a computer system during other subject classes or laboratories. Although in our School this is not a topic by itself, students usually find themselves installing, configuring and administering computer systems to fulfil other tasks. This is fine for them because it is a...
Article
Nowadays digital records are the heart of every business. From e-commerce transactions with customers and suppliers to the accumulated intellectual property of R&D departments, a business depends on the integrity of its corporate data. This paper shows the design and implementation of a digital notary system. This system enables any client to notar...

Network

Cited By