S2Salud: Sistema Supervisor de Salud inteligente en ambientes asistidos para la vida independiente

logologoMINECOlogoFEDER
  • Title: S2Salud: Sistema Supervisor de Salud inteligente en ambientes asistidos para la vida independiente
  • Funding Organisation: Ministerio de Economía y Competitividad
  • Participants: Necomplus, Insyte, Universidad Camilo José Cela, Universidad Politécnica de Madrid
  • Description: Service-oriented platform used in the process of generating a Personal eHealth Profile as an aggregation of all knowledge sources relevant for the provision of individualized personal eHealth services.
  • Tasks: Assessment, design and implementation of a fully functional eHealth System. Our group is responsible for the development of a personal profile.

logoehealth

Becas cátedra bq Febrero 2014

Dentro de las actividades de la cátedra bq se contempla el establecimiento de un programa de becas en áreas de interés para la empresa y que complementen el proceso formativo de los estudiantes.

Por lo tanto, se lanza esta convocatoria de becas para el presente curso académico.

Fecha de inicio de las becas: preferiblemente el 7 de Marzo de 2014

Fecha límite de recepción de CV: 28 de Febrero de 2014

 

Posibilidad de realizar el Proyecto Fin de Carrera, Trabajo Fin de Máster, Proyecto Fin de Grado y prácticas en empresas.

 Interesados enviar un correo electrónico con el Curriculum Vitae indicando en el asunto [Becas cátedra bq] a las siguientes personas:

Silvia Rodríguez Jiménez:  silvia.jimenez@bqreaders.com

Alvaro Araujo: araujo@die.upm.es

bq-catedra-logo

Oferta de Becas Febrero 2014

Becas cátedra bq

Dentro de las actividades de la cátedra bq se contempla el establecimiento de un programa de becas en áreas de interés para la empresa y que complementen el proceso formativo de los estudiantes.

Por lo tanto, se lanza esta convocatoria de becas para el presente curso académico.

Fecha de inicio de las becas: preferiblemente el 1 de Noviembre de 2013

Duración: 6 meses

Dedicación: 4 horas/día

Remuneración: 500 € / mes

Posibilidad de realizar el Proyecto Fin de Carrera, Trabajo Fin de Máster, Proyecto Fin de Grado y prácticas en empresas.

 

Interesados enviar un correo electrónico con el Curriculum Vitae indicando en el asunto [Becas cátedra bq] a las siguientes personas:

 

Silvia Rodríguez Jiménez:  silvia.jimenez@bqreaders.com

Alvaro Araujo: araujo@die.upm.es

Convocatoria de Becas

Improving Security in WMNs with Reputation Systems and Self-Organizing Maps

Title: Improving Security in WMNs with Reputation Systems and Self-Organizing Maps
Authors: Z. Bankovic, D. Fraga, José M. Moya, J.C. Vallejo, P. Malagón, A. Araujo, J.M. de Goyeneche, E. Romero, J. Blesa, D. Villanueva, O. Nieto-Taladriz
Published in: Journal of Network and Computer Applications, Special Issue “Wireless Mesh Networks”ISSN : 1084–8045
Date of Publication: April 2010
Digital Object Identifier : 10.1016/j.jnca.2010.03.023
Web: http://www.sciencedirect.com/science/article/pii/S1084804510000585

One of the most important problems of WMNs, that is even preventing them from being used in many sensitive applications, is the lack of security. To ensure security of WMNs, two strategies need to be adopted: embedding security mechanisms into the network protocols, and developing efficient intrusion detection and reaction systems. To date, many secure protocols have been proposed, but their role of defending attacks is very limited. The cloud vulnerability scanning tool is what is needed to make sure one safeguards their data.

We present a framework for intrusion detection in WMNs that is orthogonal to the network protocols. It is based on a reputation system, that allows to isolate ill-behaved nodes by rating their reputation as low, and distributed agents based on unsupervised learning algorithms (self-organizing maps), that are able to detect deviations from the normal behavior. An additional advantage of this approach is that it is quite independent of the attacks, and therefore it can detect and confine new, previously unknown, attacks. Unlike previous approaches, and due to the inherent insecurity of WMN nodes, we assume that confidentiality and integrity cannot be preserved for any single node.

wsn2

Using Reputation Systems and Non-Deterministic Routing to Secure Wireless Sensor Networks

Title: Using Reputation Systems and Non-Deterministic Routing to Secure Wireless Sensor Networks
Authors: José M. Moya, J.C. Vallejo, D. Fraga, A. Araujo, D. Villanueva,J.M. de Goyeneche
Published in: Sensors, Vol 9
ISSN : 1424–8220
Date of Publication: May 2009
Digital Object Identifier : 10.3390/s90503958
Web: http://www.mdpi.com/1424-8220/9/5/3958

Security in wireless sensor networks is difficult to achieve because of the resource limitations of the sensor nodes. We propose a trust-based decision framework for wireless sensor networks coupled with a non-deterministic routing protocol. Both provide a mechanism to effectively detect and confine common attacks, and, unlike previous approaches, allow bad reputation feedback to the network. This approach has been extensively simulated, obtaining good results, even for unrealistically complex attack scenarios.

amisec-elements