Arrizabalaga-Juaristi, S. (Saioa)
- Publications
- item.page.relationships.isContributorAdvisorOfPublication
- item.page.relationships.isContributorOfPublication
18 results
Search Results
Now showing 1 - 10 of 18
- Alarm collector in smart train based on ethereum blockchain events-log.(IEEE, 2021-09) Mendizabal-Samper, J. (Jaizki); Adin-Marcos, I.(Iñigo); Goya Odriozola, J. (Jon); Añorga-Benito, J.(Javier); Figueroa-Lorenzo, S. (Santiago); Arrizabalaga-Juaristi, S. (Saioa)The European Union is moving toward the "smart" era having as one of the key topics the smart mobility. What is more, the European union (EU) is moving toward Mobility as a Service (MaaS). The key concept behind MaaS is the capability to offer both the traveler's mobility and goods' transport solutions based on travel needs. For example, unique payment methods, intermodal tickets, passenger services, freight transport services, etc. The introduction of new services implies the integration of many Internet-of-Things (IoT) sensors. At this point, security gains a key role in the railway sector. Considering an environment where sensor data are monitored from sensor events, and alarms are detected and emitted when events contain an anomaly, this document proposes the development of an alarms collection system, which ensures both traceability and privacy of these alarms. This system is based on Ethereum blockchain events-log, as an efficient storage mechanism, which guarantees that any railway entity can participate in the network, ensuring both entity security and information privacy.
- Methodological performance analysis applied to a novel IIoT access control system based on permissioned blockchain(ELSEVIER, 2021-07) Añorga-Benito, J.(Javier); Figueroa-Lorenzo, S. (Santiago); Arrizabalaga-Juaristi, S. (Saioa)Considering that RFID technology presents a significant growth in IIoT environments, industrial manufacturing is being one of the most benefited by this growth. As growth implies increased security risks, access control systems have emerged as an essential solution for IIoT environments and particularly in RFID systems. Considering Hyperledger Fabric Blockchain as a modular project oriented to environments with high level of performance in terms of speed and scalability, our manuscript proposes a performance analysis based on a methodological framework to demonstrate the viability of a comprehensive access control system which includes Identification, Authentication, Authorization and Accountability/Auditing based on the permissioned blockchain Hyperledger Fabric Blockchain. Our proposal promotes a novel approach to reliable data privacy, based on private data collection solution promoted by Hyperledger Fabric to implement the registration phase of our access control system. In this regard, the feasibility of using private data collection with respect to a private data local management solution is demonstrated. Finally, thanks to the modularity promoted by Hyperledger Fabric Blockchain, we define the optimal network model for our use case. To demonstrate these approaches, several experiments are conducted, based on a proposed methodological performance framework.
- 5G Performance measurements in mobility for the bus transportation system in an urban environment.(IEEE, 2023-12) Bustamante, P. (Paul); Fernández-Berrueta, N. (Nerea); Velez-Isasmendi, I. (Igone); Figueroa-Lorenzo, S. (Santiago); Arrizabalaga-Juaristi, S. (Saioa)5G is a new technology that can provide more services, due to the improvement in performance, than the current mobile technologies. Because of that, it is selected as a possible technology for automotive transportation systems. Nevertheless, nowadays the 5G technology is in the deployment phase, which could present bugs requiring improvements in the network. Therefore, a tool capable of measuring some of the most relevant features of the 5G, as some of the requirements for the transportation system, is presented. The measurements with the specified tool were carried out in a specific line from the bus company in the San Sebastian city center with the aim of finding out the services that could be improved. Afterward, the results from the different measurements are shown, compared, and discussed. Finally, some conclusions about the obtained results and the services to use the target technology are presented.
- Edge intelligence-based proposal for onboard catenary stagger amplitude diagnosis(2023) Ciáurriz-Mañú, P. (Pablo); Errandonea, I. (Itxaro); Beltran-Calaff, S. (Segio); Alvarado-Videira, U.(Unai); Arrizabalaga-Juaristi, S. (Saioa)In recent years, the integration of Digital Twins (DT) for the adoption of smarter maintenance strategies has grown exponentially in different industrial sectors. New IoT and edge computing systems are being developed for this purpose, however, there are still some open issues and challenges to be solved. Firstly, this paper presents new approaches to the initial dependencies of the studied solution and make a new proposal to improve the interoperability of the presented system. Secondly, this paper provides a methodology applicable to similar developments of edge-based AI (Artificial Intelligence) solution, which comprises of four phases: the presentation of the multi-objective problem and the pre-selection of AI-based models, the description of the evaluation architecture, the profiling of the different models for the selection of the most suitable one and explainable AI strategies for getting insights of the selected model. Finally, it presents a use case of an edge-solution for the railway catenary geometry diagnostic (stagger amplitude of the overhead wire), saving the interoperability of the message exchange with other systems is provided.
- Novel classification method to predict the accuracy of UWB ranging estimates(2024) Ochoa-de-Eribe-Landaberea, A. (Aitor); Zamora-Cardenas, L. (Leticia); Velez-Isasmendi, I. (Igone); Arsuaga, M. (Meritxell); Arrizabalaga-Juaristi, S. (Saioa)Real time location systems (RTLSs) are becoming more relevant in a more data driven economy and society due to their wide range of application cases. When the location of an object needs to be tracked with high accuracy, ultra wideband (UWB) technology is usually the best option. Nevertheless, UWB ranging estimates are not completely immune to some sources of error such as non line of sight (NLOS) or multipath conditions. Thus, this paper proposes a real-time classification model based on machine learning (ML) to predict if received ranging estimates are in line of sight (LOS) or NLOS conditions and discard those in NLOS. However, it is also shown that classifying measurements as LOS or NLOS does not guarantee detecting inaccurate ranging estimates, since LOS measurements can also yield large errors. As an example, the ranging root mean square error (RMSE) of the data labelled as LOS in a UWB based localization system database in the literature is of 0.714 m, significantly higher than the theoretical accuracy of a UWB system. Thus, a novel ML-based classification model is proposed to predict the magnitude of the ranging error. After applying the proposed classification model in the same data, the ranging RMSE of those ranging samples classified as most accurate is of only 0.183 m, significantly lower than the best RMSE we can obtain on the classical LOS/NLOS classification approach.
- A role-based access control model in modbus SCADA systems. A centralized model approach(MDPI AG, 2019) Añorga-Benito, J.(Javier); Figueroa-Lorenzo, S. (Santiago); Arrizabalaga-Juaristi, S. (Saioa)Industrial Control Systems (ICS) and Supervisory Control systems and Data Acquisition (SCADA) networks implement industrial communication protocols to enable their operations. Modbus is an application protocol that allows communication between millions of automation devices. Unfortunately, Modbus lacks basic security mechanisms, and this leads to multiple vulnerabilities, due to both design and implementation. This issue enables certain types of attacks, for example, man in the middle attacks, eavesdropping attacks, and replay attack. The exploitation of such flaws may greatly influence companies and the general population, especially for attacks targeting critical infrastructural assets, such as power plants, water distribution and railway transportation systems. In order to provide security mechanisms to the protocol, the Modbus organization released security specifications, which provide robust protection through the blending of Transport Layer Security (TLS) with the traditional Modbus protocol. TLS will encapsulate Modbus packets to provide both authentication and message-integrity protection. The security features leverage X.509v3 digital certificates for authentication of the server and client. From the security specifications, this study addresses the security problems of the Modbus protocol, proposing a new secure version of a role-based access control model (RBAC), in order to authorize both the client on the server, as well as the Modbus frame. This model is divided into an authorization process via roles, which is inserted as an arbitrary extension in the certificate X.509v3 and the message authorization via unit id, a unique identifier used to authorize the Modbus frame. Our proposal is evaluated through two approaches: A security analysis and a performance analysis. The security analysis involves verifying the protocol’s resistance to different types of attacks, as well as that certain pillars of cybersecurity, such as integrity and confidentiality, are not compromised. Finally, our performance analysis involves deploying our design over a testnet built on GNS3. This testnet has been designed based on an industrial security standard, such as IEC-62443, which divides the industrial network into levels. Then both the client and the server are deployed over this network in order to verify the feasibility of the proposal. For this purpose, different latencies measurements in industrial environments are used as a benchmark, which are matched against the latencies in our proposal for different cipher suites.
- Cyber Resilience Progression Model(2020) Carías-Alvarez, J.F. (Juan Francisco); Hernantes-Apezetxea, J. (Josune); Labaka-Zubieta, L. (Leire); Arrizabalaga-Juaristi, S. (Saioa)Due to the hazardous current cyber environment, cyber resilience is more necessary than ever. Companies are exposed to an often-ignored risk of suffering a cyber incident. This places cyber incidents as one of the main risks for companies in the past few years. On the other hand, the literature meant to aid on the operationalization of cyber resilience is mostly focused on listing the policies required to operationalize it, but is often lacking on how to prioritize these actions and how to strategize their implementation. Therefore, the usage of the current literature in this state is not optimal for companies. Thus, this study proposes a progression model to help companies strategize and prioritize cyber resilience policies by proposing the natural evolution of the policies over time. To develop the model, this study used semi-structured interviews and an analysis of the data obtained from the interviews. Through this methodology, this study found the starting points for each cyber resilience policy and their natural progression over time. These results can help companies in their cyber resilience building process by giving them insights on how to strategize the implementation of the cyber resilience policies.
- Digital Twin for maintenance: A literature review highly cited paper.(Elsevier, 2020-12) Errandonea, I. (Itxaro); Beltran-Calaff, S. (Segio); Arrizabalaga-Juaristi, S. (Saioa)In recent years, Digital Twins (DT) have been implemented in different industrial sectors, in several applications areas such as design, production, manufacturing, and maintenance. In particular, maintenance is one of the most researched applications, as the impact of the execution of maintenance task may have a great impact in the business of the companies. For example, in sector such as energy or manufacturing, a maintenance activity can cause the shutdown of an entire production line, or in the case of a wind turbine inspection, may face the safety of an operator to measure a simple indicator. Hence, the application of more intelligent maintenance strategies can offer huge benefits. In this context, this paper focuses on the review of DT applications for maintenance, as no previous work has been found with this aim. For instance, both "Digital Twin" and "maintenance" concepts and strategies are described in detail, and then a literature review is carried out where these two concepts are involved. In addition to identifying and analyzing how DTs are currently being applied for maintenance, this paper also highlights future research lines and open issues.
- Panhead accelerations-based methodology for monitoring the stagger in overhead contact line systems(Elsevier Ltd., 2022-05) Errandonea, I. (Itxaro); Alvarado-Videira, U.(Unai); Blanco, B. (Blas); Arrizabalaga-Juaristi, S. (Saioa); Beltrán, S. (Sergio)The monitoring of overhead contact lines (OCL) is a key part of railway infrastructure maintenance. This paper proposes a methodology to assess the lateral geometry of contact wire, the so-called stagger, by using the dynamic response of a pantograph. The methodology is tested in a validated virtual environment that resembles the behaviour of the pantograph when it interacts with the OCL. A signal processing is developed to define features relating the lateral position of the contact wire with the vertical acceleration of the contact strip. It is demonstrated that these features have a clear and close connection with the lateral position of the contact wire. Subsequently, model-driven machine learning algorithms are defined using these features to address the OCL stagger prediction and the detection of out-of-range lateral displacement due to a faulty steady-arm. The methodology shows a good prediction performance in the estimation of the stagger amplitude/central position and the steady-arms diagnosis. The prediction of the stagger amplitude is performed with a root-mean-square error of 4.7(10) mm. In addition, the area under the Precision-Recall curve is 0.952 CI95 [0.940, 0.962] for the steady-arms diagnosis.
- A comprehensive review of RFID and bluetooth security: practical analysis(MDPI AG, 2019) Añorga-Benito, J.(Javier); Figueroa-Lorenzo, S. (Santiago); García-Cardarelli, P. (Pablo); Alberdi-Garaia, J. (Jon); Arrizabalaga-Juaristi, S. (Saioa)The Internet of Things (IoT) provides the ability to digitize physical objects into virtual data, thanks to the integration of hardware (e.g., sensors, actuators) and network communications for collecting and exchanging data. In this digitization process, however, security challenges need to be taken into account in order to prevent information availability, integrity, and confidentiality from being compromised. In this paper, security challenges of two broadly used technologies, RFID (Radio Frequency Identification) and Bluetooth, are analyzed. First, a review of the main vulnerabilities, security risk, and threats affecting both technologies are carried out. Then, open hardware and open source tools like: Proxmark3 and Ubertooth as well as BtleJuice and Bleah are used as part of the practical analysis. Lastly, risk mitigation and counter measures are proposed.