Rodolfo Villaca’s research while affiliated with Instituto Federal de Educação, Ciência e Tecnologia do Espírito Santo (IFES) and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (60)


Figura 1 -Rastreabilidade e transparência implementandas por meio de mecanismos de controle e análise do percurso dos produtos em uma supply chain.
ADOÇÃO DE TECNOLOGIAS BLOCKCHAIN NA RASTREABILIDADE EM CADEIAS DE SUPRIMENTOS BRASILEIRASBLOCKCHAIN TECHNOLOGIES ADOPTION FOR TRACEABILITY IN BRAZILIAN SUPPLY CHAINSADOPCIÓN DE TECNOLOGÍAS BLOCKCHAIN EN TRAZABILIDAD EM CADENAS DE SUMINISTRO BRASILEÑAS
  • Article
  • Full-text available

February 2025

·

39 Reads

P2P E INOVAÇÃO

·

Rodolfo da Silva Villaça

·

Gustavo Santa Clara Alochio

·

[...]

·

Gesiane Silveira Pereira

A rastreabilidade é uma característica essencial para uma gestão eficaz das cadeias de suprimento, mas sua implementação pode enfrentar alguns desafios como garantia de integridade e acessibilidade dos registros. As blockchains, com sua estrutura descentralizada e imutável, prometem superar esses desafios, reforçando a segurança e a transparência dos dados. Apesar do crescente aumento dos estudos sobre a aplicação de blockchains em cadeias de suprimentos nos últimos anos, ainda há poucos trabalhos que explorem sua adoção no Brasil. Da mesma forma, o desenvolvimento de soluções voltadas para o mercado brasileiro é limitado, com poucos sistemas adaptados às suas necessidades específicas. Tendo isso em vista, o presente trabalho apresenta uma análise da adoção de blockchains no suporte à rastreabilidade em cadeias de suprimentos brasileiras, abordando tanto pesquisas acadêmicas quanto soluções desenvolvidas no país, fazendo, ao mesmo tempo, um paralelo com a adoção dessa tecnologia nas cadeias de suprimento estrangeiras. Com base nesse estudo, foram identificadas as potenciais dificuldades e barreiras à adoção de tecnologias blockchains nas cadeias de suprimento brasileiras.

Download

An Intelligent Native Network Slicing Security Architecture Empowered by Federated Learning

October 2024

·

54 Reads

Network Slicing (NS) has transformed the landscape of resource sharing in networks, offering flexibility to support services and applications with highly variable requirements in areas such as the next-generation 5G/6G mobile networks (NGMN), vehicular networks, industrial Internet of Things (IoT), and verticals. Although significant research and experimentation have driven the development of network slicing, existing architectures often fall short in intrinsic architectural intelligent security capabilities. This paper proposes an architecture-intelligent security mechanism to improve the NS solutions. We idealized a security-native architecture that deploys intelligent microservices as federated agents based on machine learning, providing intra-slice and architectural operation security for the Slicing Future Internet Infrastructures (SFI2) reference architecture. It is noteworthy that federated learning approaches match the highly distributed modern microservice-based architectures, thus providing a unifying and scalable design choice for NS platforms addressing both service and security. Using ML-Agents and Security Agents, our approach identified Distributed Denial-of-Service (DDoS) and intrusion attacks within the slice using generic and non-intrusive telemetry records, achieving an average accuracy of approximately 95.60%95.60\% in the network slicing architecture and 99.99%99.99\% for the deployed slice -- intra-slice. This result demonstrates the potential for leveraging architectural operational security and introduces a promising new research direction for network slicing architectures.






Make Before Degrade: A Context-Aware Software-Defined WiFi Handover

March 2023

·

24 Reads

·

1 Citation

Ultra-reliable and low-latency communications are essential for new services and applications in Industry 4.0. URLLC is also required to provide traffic density to meet the throughput demands of its clients across the coverage area via cell densification. However, cell densification implies that handover between serving stations will become more and more frequent. In this paper, we introduce the Make Before Degrade solution for zero mobility interruption with a single radio connection. Mobility management is based on contextual information that allows prudently to shift traffic flows before their propagation paths are compromised. The paper brings a proof-of-principle software-defined WiFi testbed able to meet 3GPP’s traffic density specifications in which contextual information is provided by computer vision. An Industry 4.0 use case based on cloud robotics demonstrates the practical applicability of our proposal.


MPolKA-INT: Stateless Multipath Source Routing for In-Band Network Telemetry

March 2023

·

16 Reads

·

4 Citations

Real-time monitoring and measurement are the basis for most management operations, such as traffic engineering, quality of service assurance, and anomaly detection. Nevertheless, collecting measurements from all network devices with sampling and polling-based methods is not scalable. To tackle this issue, the P4 Language Consortium proposed the In-band Network Telemetry (INT) framework that provides real-time and fine-grain measurements in the data plane using telemetry packets. However, the task of specifying the route taken by a telemetry probe still relays on the traditional routing protocols, which require state changes in routing tables and fail to achieve the required accuracy, coverage and latency. In this context, this article investigates how to combine INT with a source routing method based on the stateless Multipath Polynomial Key-based Architecture (M-PolKA). We implemented this multipath telemetry solution as MPolKA-INT using the P4 language, and the experimental results showed low overhead in the data and control planes with agile and flexible path (re)configuration, since it does not require state changes in the routing tables of the devices in the network core.


M-PolKA: Multipath Polynomial Key-Based Source Routing for Reliable Communications

September 2022

·

14 Reads

·

16 Citations

IEEE Transactions on Network and Service Management

Innovative traffic engineering functions and services require disrupting routing and forwarding mechanisms to be performed with low overhead over complex network topologies. Source routing (SR) is a prominent alternative to table-based routing for providing the needed expressiveness and agility by reducing the number of network states. This work proposes the M-PolKA, a topology-agnostic multipath source routing scheme and orchestration architecture for reliable communications, which explores special properties from the Residue Number System (RNS) polynomial arithmetic. A P4-based proof-of-concept is experimentally demonstrated using emulated and hardware prototypes. Also, use cases for revealing M-PolKA’s functionalities are tested in different scenarios in order to address problems, such as communication reliability improvement, agile path migration and fast failure reaction. Finally, low overhead for extra functionalities is observed when RNS-based SR is compared to traditional routing approaches.



Citations (36)


... The SFI2 project [13] defines the SFI2 network slicing reference architecture to create and manage multi-domain and multitechnology end-to-end slicing services. This architecture incorporates advanced network slicing concepts like ML-native optimizations, energy-efficient slicing, and slicing-tailored security functionalities [17] [18] as highlighted in Figure 3. In the SFI2 architecture, the slice builder component builds the requested slice, considering the available resources in the domain marketplace, and optimizes their utilization in each built slice In sequence, the slice instantiation component deploys the configured slice in the target and optimizes the resources made available to the provider's network. ...

Reference:

Towards Sustainability in 6G Network Slicing with Energy-Saving and Optimization Methods
An intelligent native network slicing security architecture empowered by federated learning
  • Citing Article
  • October 2024

Future Generation Computer Systems

... In the basic service set (BSS), some APs continuously receive normal administrator traffic while other APs become overloaded with delay sensitive traffic received from healthcare applications or VoIP. In such scenarios an adaptive network configuration is required that connects the IoT device sending delay sensitive information to an AP which is underloaded [14]. The fairness of load among the APs cannot be achieved in standard IEEE 802.11 networks and hence non standardize protocols/hardware makes it almost impossible to achieve load balancing among the APs in smart cities. ...

Make Before Degrade: A Context-Aware Software-Defined WiFi Handover
  • Citing Chapter
  • March 2023

... Furthermore, the solution presented here makes use of source routing and multipath (multicast) trees to reduce the number of probes required to cover all switches in the network, avoiding overlaps of these probes as they traverse the topology. For this, we adopt the MPolKA-INT mechanism [de O. Pereira et al. 2023], which uses source-based routing, replacing traditional routing tables with a label used for forwarding packets in the network. The solution was implemented using the P4 language and evaluated in a Mininet environment with BMv2 (Behavioral Model version 2) switches. ...

MPolKA-INT: Stateless Multipath Source Routing for In-Band Network Telemetry
  • Citing Chapter
  • March 2023

... As future works, we envision deploying PolKA source routing protocol [Dominicini et al. 2020] and its recent extension for multi-path , as a next step to advance our previous experience in protocol deployment at testbeds reported in [Borges et al. 2022]. We also plan to incorporate bottleneck structure analysis [Ros-Giralt et al. 2021] for the design of bandwidth-efficient slices and to optimize traffic engineering on a deployed slice. ...

A lifecycle experience of PolKA: From prototyping to deployment at Géant Lab with RARE/FreeRtr

... A more detailed analysis regarding this topic is discussed later in this section. The scope and application domain of IoT networks align closely with Industrial Networks and related networks [6,25,42]. Areas such as Secure Data Sharing [6,25,42], Efficiency and Optimization [58,96,104], Device Identity and Authentication [9,91,96], Interoperability [58,69], Enhancing Security and Safety [69,72,80], and Smart Contract [25,90] have been extensively discussed previously. Thus, they will not be included here. ...

IoT Data Storage on a Blockchain Using Smart Contracts and IPFS
  • Citing Conference Paper
  • August 2022

... Chainlink is currently used mainly in DeFi (Decentralized Finance) projects and applications to feed data and market prices for their contracts [28], such as the cryptocurrency loan platform Liquity and Hedge. There are also articles proposing to combine Oracle and Smart Contract, as in the work done by Gonçalve in [29]. As time progresses, more and more platforms are using other products of Chainlink. ...

Data Integrity Verification in Network Slicing using Oracles and Smart Contracts
  • Citing Conference Paper
  • August 2022

... MPolKA- INT [de O. Pereira et al. 2023] proposes a mechanism to perform network telemetry, exploring multiple paths, reducing overhead in both the control and data planes, eliminating redundancy in telemetry information, and replacing probe routing tables with source-based routing. To cover the nodes of interest in the network, the proposal uses the Multipath Polynomial Key-based Architecture (M-PolKA) routing solution [Guimarães et al. 2022], as it is a source-based routing method with support for multipaths, where a route label representing a cycle or tree can be encoded in a topology-agnostic manner [Guimarães et al. 2022]. ...

M-PolKA: Multipath Polynomial Key-Based Source Routing for Reliable Communications
  • Citing Article
  • September 2022

IEEE Transactions on Network and Service Management

... Recent surveys indicate a 100 % increase in excessive spending on "orphaned" SaaS systems that are no longer in use. In some cases, specialized hardware or software that has not been integrated with other programs or serves only one purpose could go unnoticed for years [70]. Furthermore, the multitude of everyday techniques and remedies sometimes leads to overload. ...

An integrated solution of software and hardware for environmental monitoring
  • Citing Article
  • March 2022

Internet of Things

... The FIBRE-NG domain is an experimental network composed of islands hosting resources (VMs, containers, and bare metal) for experimentation and the IPÊ network [49]. The islands are physically located in universities and research centers scattered in Brazil from north to south, and the IPÊ network provides the necessary network interconnection among islands to support running distributed experiments. ...

Caracterização e Previsão de Falhas em Serviços de Conectividade: uma Aplicação à Rede Ipê
  • Citing Conference Paper
  • August 2021

... The PolKA routing approach has been tested on commercial programmable equipment in international testbeds for high-speed data transfers (10 Gbps and 100 Gbps), showing similar performance to traditional forwarding methods [23], [24]. It was later integrated in an emulated testbed with the RARE/freeRtr platform [25] for automated control plane operations and simplified tunnel creation [26]. ...

Deploying PolKA Source Routing in P4 Switches : (Invited Paper)
  • Citing Conference Paper
  • June 2021