Roben LunardiInstituto Federal de Educação, Ciência e Tecnologia do Rio Grande do Sul | IFRS · Computer Science
Roben Lunardi
PhD
Associate Professor at IFRS
About
60
Publications
16,058
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
657
Citations
Introduction
Roben Castagna Lunardi is an Associate Professor at the Federal Institute of Education, Science and Technology of Rio Grande do Sul (IFRS) - Campus Restinga. He has experience in Computer Science, with an emphasis on Systems Security, Computer Networks and Automation, acting on the following subjects: Blockchains, Information Security, Computer Network Management, Software Defined Networks, Infrastructure Change Management IT, IoT and Educational Robotics.
Education
March 2017 - March 2021
March 2008 - November 2010
March 2004 - February 2008
Publications
Publications (60)
Due to increased number of attacks on the Internet of Things (IoT) devices, the security of IoT networks became critical. Some recent researches proposed the adoption of blockchain in IoT networks without a thorough discussion on the impact of the solution on the devices performance. Furthermore, blockchain employment in the context of IoT can be c...
The Internet of Things (IoT) is transforming our physical world into a complex and dynamic system of connected devices on an unprecedented scale. Connecting everyday physical objects is creating new business models, improving processes and reducing costs and risks. Recently, blockchain technology has received a lot of attention from the community a...
In proof-of-work based blockchains such as Ethereum, verification of blocks is an integral part of establishing consensus across nodes. However, in Ethereum, miners do not receive a reward for verifying. This implies that miners face the Verifier's Dilemma: use resources for verification, or use them for the more lucrative mining of new blocks? We...
Blockchain technology has been applied to various applications (e.g., smart buildings and smart cities) that typically run in an environment of smart devices, known as Internet-of-Things (IoT). To support these applications, different blockchain architectures, data structures and consensus algorithms have been proposed, tailored to IoT. One such pr...
The Internet of Things (IoT) has been making people’s lives more efficient and more comfortable in the past years, and it is expected to get even better. This improvement may benefit from the use of blockchain to enhance security, scalability, reliability and auditability. Recently, different blockchain architectures were proposed to provide a solu...
With the increasing number of Internet-based resources and applications, the amount of attacks faced by companies has increased significantly in the past years. Likewise, the techniques to test security and emulate attacks need to be constantly improved and, as a consequence, helping mitigate attacks. Among these techniques, penetration test (Pente...
A heterogeneidade de dados, dispositivos e protocolos de comunicação relacionados ao domínio Internet of Things (IoT) estão afetando diretamente o processo investigativo da Forense Computacional. Nesse sentido, este trabalho tem como objetivo analisar características de cenários como smart homes, smart offices e smart building para propor um modelo...
Smart cities use information and communication technologies to offer efficient management of services, resources and infrastructure to improve the quality of life for their citizens while addressing environmental and urban challenges and promoting economic growth. The smart city concept relies on digital connectivity and a growing number of network...
Blockchain technology has been successfully applied to various fields that require secure and decentralized storage of information. One such area is product lifecycle management, which traditionally relies on centralized storage. However, using conventional blockchains in this context presents certain challenges, mainly related to performance and l...
Smart shared spaces, such as smart buildings, represent a fast-growing market and can benefit from several sensors that generate data which can be used to improve automatisation, increase efficiency in energy management, and optimise occupant’s comfort. Equally, the smart shared spaces pose many privacy challenges as they are equipped with sensors...
Security and privacy became vital to any of the current computational systems or applications. Particularly, investigating possible security issues-to mitigate possible data leaks or tampering-is an important step in the current software development. Currently, penetration tests (pentest) are performed to detect possible system flaws and to prevent...
Atualmente, existem diversos dispositivos que coletam dados e prestam serviços na Internet. Alguns desses dispositivos colaboram para trocar informacões e usá-las para tomar decisões mais inteligentes em um ambiente chamado Internet das Coisas (IoT). Recentemente, a tecnologia blockchain surgiu como uma possível solução para superar problemas de se...
Este é o primeiro da série de livros do programa UniHacker.Club. O material aqui apresentado é resultado de cursos de formação em segurança computacional promovidos pelo programa, sendo elaborado em conjunto por diferentes profissionais (da Academia e Indústria) sobre conceitos Fundamentais de Segurança da Informação. Cada capítulo traz, de forma i...
Resumo. Neste capítulo será realizada uma introdução ao instrumento tec-nológico que fornece os fechos e as chaves da Era da Informação, a cripto-grafia. Com o intuito de apresentar um panorama geral sobre o tema, serão discutidos seus principais conceitos, elencados seus principais tipos, esquemas e algoritmos. Além disso, sempre que possível, ser...
A evolução das infraestruturas de redes de computadores e protocolos de comunicação tem sido restringida nas últimas décadas. Isso ocorreu devido às dificuldades em realizar mudanças na infraestrutura de rede, a predominância de tecnologias específicas do fornecedor e as limitações no hardware disponível. As Redes Definidas por Software (SDN) traze...
Blockchain has emerged as a technology that can change the way people and systems interact, providing mechanisms that ensure integrity and ownership of the data produced without reliance on a trusted third-party. Appendable-block blockchain is a novel instantiation that suits for solutions that require a high transaction throughput. Appendable-bloc...
In the last few years, different researchers presented proposals for using blockchain in the Internet of Things (IoT) environments. These proposals consider that IoT environments can be benefited from different blockchain characteristics, such as: resilience, distributed processing, integrity and non-repudiation of produced information. However, re...
Currently, blockchain proposals are being adopted to solve security issues, such as data integrity, resilience, and non-repudiation. To improve certain aspects, e.g., energy consumption and latency, of traditional blockchains, different architectures, algorithms, and data management methods have been recently proposed. For example, appendable-block...
Após a introdução do Bitcoin, a tecnologia de \textit{blockchain} evoluiu como uma solução para fornecer integridade, não repúdio e disponibilidade de dados para diferentes sistemas. Cenários sensíveis a dados, como Health Care, também podem se beneficiar dessas propriedades da blockchain. Assim, diferentes propostas, tanto da Academia quanto da In...
Blockchain emerged as a solution for data integrity, non-repudiation, and availability in different applications. Data sensitive scenarios, such as Health Care, can also benefit from these blockchain properties. Consequently, different research proposed the adoption of blockchain in Health Care applications. However, few are discussed about incenti...
Mobile applications are used to handle different types of data. Commonly, there is a set of personal identifiable information present in the data stored, shared and used by these applications. From that, attackers can try to exploit the mobile application in order to obtain or to cause private data leakage. Therefore, performing security assessment...
Blockchain emerged as a solution for data integrity, non-repudiation, and availability in different applications. Data sensitive scenarios, such as Health Care, can also benefit from these blockchain properties. Consequently, different research proposed the adoption of blockchain in Health Care applications. However, few are discussed about incenti...
Mobile applications are used to handle different types of data. Commonly, there is a set of personally identifiable information present in the data stored, shared and used by these applications. From that, attackers can try to exploit the mobile application in order to obtain or to cause private data leakage. Therefore, performing security assessme...
Cyberphysical Systems (CPS) are transforming the way we interact with the physical world around us. However, centralised approaches for CPS systems are not capable of addressing the unique challenges of CPS due to the complexity, constraints, and dynamic nature of the interactions. To realize the true potential of CPS, a decentralized approach that...
The Internet of Things (IoT) is transforming our physical world into a complex and dynamic system of connected devices on an unprecedented scale. Connecting everyday physical objects is creating new business models, improving processes and reducing costs and risks. Recently, blockchain technology has received a lot of attention from the community a...
Atualmente, o número e a diversidade de dispositivos conectados à internet continua aumentando. Consequentemente, o gerenciamento de segurança se tornou um grande desafio. Desta forma, o Gerenciamento de Eventos e Segurança da Informação (SIEM) pode ajudar a coletar e analisar eventos gerados por diferentes ferramentas de gerenciamento. No entanto,...
A tecnologia de blockchain surgiu como uma solução para integridade, não-repúdio e disponibilidade de dados para os diferentes setores da indústria. Cenários sensíveis a dados, como a área da saúde, podem se beneficiar dessas propriedades de blockchains. Consequentemente, diferentes pesquisas propuseram a adoção de blockchain em aplicações de saúde...
The exponential increase in connected devices with built-in sensing, processing, and communication capabilities has fuelled the development of IoT applications, which creates new ecosystems for device-to-device interactions, supports smart environments, and leads to new business models. Empowered by these capabilities, IoT devices interact with eac...
There is increased interest in smart vehicles acting as both data consumers and producers in smart cities. Vehicles can use smart city data for decision-making, such as dynamic routing based on traffic conditions. Moreover, the multitude of embedded sensors in vehicles can collectively produce a rich data set of the urban landscape that can be used...
In the last few years, novel approaches for using blockchain to solve Internet of Things (IoT) security and dependability issues have been proposed. Currently, different solutions were applied to Smart Homes, Smart Cities, Smart Grids, Supply Chains, Industry, and Vehicular Networks scenarios. Despite of that, the main advantages on the adoption of...
There is increased interest in smart vehicles acting as both data consumers and producers in smart cities. Vehicles can use smart city data for decision-making, such as dynamic routing based on traffic conditions. Moreover, the multitude of embedded sensors in vehicles can collectively produce a rich data set of the urban landscape that can be used...
In order to discuss the performance issues of Blockchain usage in IoT Networks, our work presents some results to overcome this problem. Moreover, the poster presents a discussion on an IoT Ledger, called Resilient and Robust Access Control (R2AC), i.e. a blockchain designed for IoT devices and gateways, and shows some preliminary performance resul...
Smart environments are designed to improve our daily lives by providing means to monitor a physical environment and react to the context in automatic and proactive ways. These environments are typically composed by a variety of sensors, actuators, and controllers interconnected by a network infrastructure. In order to allow interoperability with cu...
This paper proposes a prototypical system called PySoneta-currently under development. This system has the objective to allow network administrators to visualize the network packets traffic. The visualizations generated by the system are focused on IPv6 packets to help administrators to understand the network behavior. As preliminary results, it wa...
Despite the Change and Problem Management have received significant attention from the academic community in recent years, the developed solutions do not identify the root cause of failures in IT Changes and, in some cases, only detect software failures. To address this, in this paper, we introduce four strategies to identify root cause of problems...
Services provided by modern organizations are usually designed, deployed, and supported by large-scale IT infrastructures. In order to obtain the best performance out of these services, it is essential that organizations enforce rational practices for the management of the resources that compose their infrastructures. A common point in most guides...
In the context of Information Technology (IT) project management, it is commonly accepted that the costs associated with support actions are strongly influenced by the effort spent during their development and test phases. Despite the importance of systematically characterizing and understanding this relationship, little has been done in this realm...
The reuse of knowledge acquired by operators to diagnose failures in Information Technology (IT) infrastructures has potential to decrease the recurrence of failures and, consequently, reduce possible losses and maintenance costs. Nevertheless, existing solutions to support failure diagnosis lack of flexibility to adapt to a constantly changing IT...
There is an intuitive notion that the costs associated with project support actions, currently deemed too high and increasing, are directly related to the effort spent during their development and test phases. Despite the importance of systematically characterizing and understanding this relationship, little has been done in this realm mainly due t...
Planning is a fundamental sub-process of the overarching Information Technology (IT) change management process, proposed by the Information Technology Infrastructure Library to help organizations to deploy and maintain IT services in an effective and efficient way. A major issue behind IT change planning and of special importance for the alignment...
Information Technology (IT) products and services provided by modern organizations are designed in projects that often involve large amount of resources (e.g., humans, hardware, and software). It is essential that organizations enforce rational practices for project management, in order to successfully conclude projects and avoid waste of substanti...
Change planning represents a key element for the operation and management of Information Technology infrastructures and services.
Its scope ranges from the high level design of a change request to the generation, either manually or automatically, of detailed
plans that, if executed, will perform the requested changes (e.g., modification of network...
The rational management of IT infrastructures is a goal of modern organizations that aim to deliver high quality services
to their customers in an affordable way. Since changes are imminent in such a dynamic environment, failures during this process
may directly affect business continuity. Hence, risk assessment is a key process in IT change manage...
The main goal of change management is to ensure that standardized methods and procedures are used for the efficient and prompt handling of changes in IT systems, in order to minimize change-related incidents and service-delivery disruption. To meet this goal, it is of paramount importance reusing the experience acquired from previous changes in the...
In order to deal with failures in the deployment of IT changes and to always leave IT infrastructures into consistent states, we proposed in a previous work, a solution to automate the generation of rollback plans in IT change management systems. The solution was based on a mechanism that treats requests for change (RFC) (or parts of them) as a sin...
The growing necessity of organizations in using technologies to support to their operations implies that managing IT resources became a mission-critical issue for the health of the primary companies' businesses. Thus, in order to minimize problems in the IT infrastructure, possibly affecting the daily business operations, risks intrinsic to the cha...
Change Management systems aim to coordinate and deploy changes over modern IT (Information Technology) infrastructures. However, unexpected failures may occur during the deployment of changes, leading the managed infrastructure to an inconsistent state. In order to minimize the effects caused by those failures, these systems should support compensa...
Intrusion detection systems are used to detect attacks and malicious or inadequate use of the network. These systems work by analyzing signatures or anomalies in network traffic. This paper present the DIBSet, a time series based intrusion detector, that explores time series forecasting methods to detect anomalies and related attacks. From a concep...
Change Management systems aim to coordinate and deploy changes over modern IT (Information Technology) infrastructures. However, unexpec- ted failures may occur during the deployment of changes, leading the managed infrastructure to an inconsistent state. In order to minimize the effects caused by those failures, these systems should support compen...
The proper management of IT infrastructures is essential for organi-zations that aim to deliver high quality services. Given the dynamics of these en-vironments, changes become imminent. In some cases these changes might raise failures that may cause disruption to services affecting the business continuity, which makes necessary the evaluation of t...