INTRODUCTION

The Information Security Group (ISG) focuses its activity on the development and proposal of security services, and their deployment in telecommunication networks.
The Information Security Group (ISG) was created at the Universitat Politecnica de Catalunya (UPC) in 2002. From the very beginning, the main strategic objective of the ISG group was to be a reference security group.
Currently, the group is formed by 9 professors and after 15 years working together, the results are 163 papers in ranked journals, 321 papers in conferences, 60 competitive projects, 20 read thesis, 17 books and book chapters, 12 awards and 9 patents.
The group is leading the security and privacy tasks in the H2020 BIG IoT project including blockchain for enhancing security and privacy on the IoT. The group has also expererience in network forensics, remote tools, cloud forensics and antiforensics tools. In addition, ISG members have worked in traceability and fingerprinting codes, as well as decoding algorithms. Finally, we have experience in authentication and certification at different protocol layers.

RESEARCH TOPICS

Blockchain technologies
Network forensics
Security protocol description through sematics
Privacy
Copyright protection and digital content distribution rights
Authentication and certificate revocation
Secure identification
Reputation systems
Security in wireless/wired networks (IoT, cloud, MANET, VANET, p2p, cognitive, satellite, and sensor networks)

ONGOING PROJECTS

BIGIoT: Bridging the Interoperability Gap of the Internet of Things. Commission of European Communities. H2020-688038-BIG Iot. Budget: 218.300,00 €. Dates: from 2016-01-01 to 2018-12-31. IP: Juan Hernández
ISG-SGR: Information Security Group - Consolidated Research Group. AGAUR. Agència de Gestió d'Ajuts Universitaris i de Recerca. 2017 SGR 782. Budget: 62.280,00 €. Dates: from 2017-01-01 to 2019-12-31. IP: Oscar Esparza
ANFORA: Análisis forense avanzado. Ministerio de Economía y Competitividad. TEC2015-68734-R. Budget: 138.545,00 €. Dates: from 2016-01-01 to 2018-12-31. IP: Miquel Soriano and Juan Hernández
ARPASAT: Arquitectura software para control de tasa en redes integradas satélite-terrestre. Ministerio de Economía y Competitividad. TEC2015-70197-R Budget 99.220,00 €. Dates: from 2016-01-01 to 2019-12-31.

CONTACT PERSON
Oscar Esparza
email: oscar.esparza@entel.upc.edu

Recent Submissions

  • Simplicial degree in complex networks. Applications of topological data analysis to network science 

    Hernández Serrano, Daniel; Hernández Serrano, Juan; Sánchez Gómez, Darío (2020-08)
    Article
    Restricted access - publisher's policy
    Network Science provides a universal formalism for modelling and studying complex systems based on pairwise interactions between agents. However, many real networks in the social, biological or computer sciences involve ...
  • Adaptive IP scheduler design to support QoS guarantees over satellite systems 

    Rendón Morales, Elizabeth; Mata Diaz, Jorge; Alins Delgado, Juan José; Muñoz Tapia, José Luis; Esparza Martín, Óscar (2012-06)
    Article
    Open Access
    This paper presents an adaptive algorithm for man-aging the weight values of the Weighted Round Robin (WRR)scheduler to provide End-to-End (E2E) Quality of Service (QoS)guarantees for Broadband satellite ...
  • A new class of traceability schemes 

    Egorova, Elena; Fernández Muñoz, Marcel; Kabatiansky, Grigory (2019)
    Conference report
    Restricted access - publisher's policy
    A new class of tracing traitors schemes with traceability property which combines ideas of nonbinary IPP-codes and IPP set systems is proposed. A detailed comparison of the proposed scheme with previously known traceability ...
  • Signature codes for weighted noisy adder channel, multimedia fingerprinting and compressed sensing 

    Egorova, Elena; Fernández Muñoz, Marcel; Kabatiansky, Grigory; Moon Ho, Lee (2019-03-01)
    Article
    Open Access
    We propose a new approach to construct noise-resistant multimedia fingerprinting codes. Our approach is based on the theory of the signature codes for multiple access channels, mainly, for a weighted noisy adder channel. ...
  • On non-binary traceability set systems 

    Egorova, Elena; Fernández Muñoz, Marcel; Kabatiansky, Grigory (2020-03-19)
    Article
    Open Access
    We introduce non-binary IPP set systems with traceability properties that have IPP codes and binary IPP set systems with traceability capabilities as particular cases. We prove an analogue of the Gilbert–Varshamov bound ...
  • An architecture for easy onboarding and key life-cycle management in blockchain applications 

    Genés Durán, Rafael; Yarlequé Ruesta, Diana; Bellés Muñoz, Marta; Jimenez Viguer, Antonio; Muñoz Tapia, José Luis (Institute of Electrical and Electronics Engineers (IEEE), 2020-06-22)
    Article
    Open Access
    New manufacturing paradigms require a large number of business interactions between multiple cyber-physical systems with different owners. In this context, public distributed ledgers are disruptive because they make it ...
  • Mixed integration of CDIO skills into telecommunication engineering curricula 

    Sayrol Clols, Elisa; Bragós Bardia, Ramon; Alarcón Cot, Eduardo José; Cabrera-Bean, Margarita; Calveras Augé, Anna M.; Comellas Colomé, Jaume; O'Callaghan Castellà, Juan Manuel; Pegueroles Vallés, Josep R.; Pla, Enrique; Prat Viñas, Lluís; Sáez Moreno, Germán; Sardà Ferrer, Joan; Tallon Montoro, Carme (2010)
    Article
    Open Access
    Spain has been intensively involved in designing engineering curricula for the last two years and next academic year all engineering schools will be deploying all bachelor programs adapted to the EHEA and to the Spanish ...
  • Cifrado en flujo basado en NLFSR 

    Gonzalo, R; Soriano Ibáñez, Miguel (Asociación de Técnicos de Informática, 1998-07)
    Article
    Open Access
    Los mecanismos de cifrado en flujo constituyen una alternativa interesante para proporcionar confidencialidad en distintos entornos como comunicaciones móvi­les y redes de alta velocidad. En la literatura se han estudiado ...
  • Esquemas de fingerprinting para la protección de derechos de distribución 

    Fernández Muñoz, Marcel; Soriano Ibáñez, Miguel; Domingo Ferrer, Josep; Sebé Feixas, Francesc (Asociación de Técnicos de Informática, 2002-12)
    Article
    Open Access
  • Risk-based decision-making for public key infrastructures using fuzzy logic 

    Hernández Gañán, Carlos; Muñoz Tapia, José Luis; Esparza Martín, Óscar; Mata Diaz, Jorge; Alins Delgado, Juan José (2012-11-01)
    Article
    Restricted access - publisher's policy
    Public key infrastructures (PKIs) are complex systems that are responsible for giving users enough information to make reasonable trust judgments about one another. The validation of public keys is hence of great importance. ...
  • QoSatAr: a cross-layer architecture for E2E QoS provisioning over DVB-S2 broadband satellite systems 

    Rendón Morales, Elizabeth; Mata Diaz, Jorge; Alins Delgado, Juan José; Muñoz Tapia, José Luis; Esparza Martín, Óscar (2012-10-01)
    Article
    Open Access
    This article presents QoSatAr, a cross-layer architecture developed to provide end-to-end quality of service (QoS) guarantees for Internet protocol (IP) traffic over the Digital Video Broadcasting-Second generation (DVB-S2) ...
  • DECADE: Distributed Emergent Cooperation through ADaptive Evolution in mobile ad hoc networks 

    Mejía Fajardo, Marcela; Peña Traslaviña, Néstor; Muñoz Tapia, José Luis; Esparza Martín, Óscar; Alzate Monroy, Marco (Elsevier, 2012-09)
    Article
    Restricted access - publisher's policy
    The scarce resources of a mobile ad hoc network (MANET) should not be wasted attending selfish nodes (those nodes that use resources from other nodes to send their own packets, without offering their own resources to forward ...

View more