Skip to main content

Main navigation

  • About ITEFI
  • Research
  • Formación y empleo
  • OpenLab
  • Servicios científico técnicos
  • Staff Directory

ORACLE: Organically Resilient and Secure Wireless Networks for Next-Generation IoT Technologies to serve Future Connected Societies

  • Proyecto
  • Resultados
  • Otros

It can be said that the Next-Generation Internet of Things (NG-IoT), powered by the flexibility, wide range of data-rates, support of heterogeneity, ultralow latency, intelligence and massive user capacities delivered by 5G and 6G networks, will be the main driver for economic growth and human development for the next decades. Among others, an important impact of 5G/6G and the NG-IoT is that these technologies will allow the user to use sensors and mobile devices more effectively and efficiently, according to their needs and the characteristics of the operating environment. To elaborate, while today most connected services are accessed from an APP or website running a smartphone, with the NG-IoT connected services will be provided by a multitude of devices embedded in the environment itself. Under such a scenario, however, security and in particular, light-weight, embedded, intelligent and ubiquitous security becomes an absolute necessity, or better enabler, without which the NG-IoT is unfeasible as sensitive information from users such as personal, health-related and financial data would be exposed.

In an environment such as the one described, secure access to information requires user's continuous authentication and the proliferation of services means that password-based authentication degrades the user's experience and causes bad practices in the generation and custody of such paswords. Add to the later the notion that with the NG-IoT users will interact daily with countless devices, many of which will behave autonomously, and the potential disaster in terms of vulnerabilities of private and sensitive information is clear.

Fortunately, the source of the problem is also its solution, as Information and Communications Technologies (ICT), and in particular information security and wireless communications technologies have within them all the features from which to derive the necessary measures to counteract security vulnerabilities. For example, one of the most fundamental emerging problems in data security is the raise of quantum computing and machine learning, which may soon result in such an increase in computational and inference capabilities that even the most complex encryption techniques might be exposed, because encryption keys are essentially pseudo-random numbers, where the word pseudo indicates that no computer can generate truly random numbers, but only numbers whose generation is hard to reengineer today, and which sophisticated machine learning algorithms running on powerful quantum computers might soon easily break.

Fortunately, the wireless channel has the physical property of being reciprocal and particular to a pair of transmitter-receiver, such that truly random secret keys can be generated taking advantage of the characteristics of such a channel. Indeed, according to the theoretical principles of information, secret messages can be exchanged between a source and a receiver taking advantage of the physical characteristics of the medium to build confidential channels. Project ORACLE will focus on these and other emerging techniques, aiming to resolve the security vulnerabilities of NG-IoT.

Publicaciones
Año: 2022
Revistas JCR
A modification proposal for the reconciliation mechanism of the key exchange algorithm NewHope
V Gayoso Martínez, L Hernández Encinas, A Martín Muñoz
Logic Journal of the IGPL, 2022;, jzac011
https://doi.org/10.1093/jigpal/jzac011
GiCSI
Analysis of the FO Transformation in the Lattice-Based Post-Quantum Algorithms
González de la Torre MÁ, Hernández Encinas L, Queiruga-Dios A
Mathematics 2022, 10, 2967.
https://doi.org/10.3390/math10162967
GiCSI
Libros y Capítulos de Libro
About the Fujisaki-Okamoto Transformation in the Code-Based Algorithms of the NIST Post-quantum Call
González de la Torre, M.Á., Hernández Encinas, L.
P. García Bringas et al. (Eds.), Springer, Lecture Notes in Networks and Systems 523, 75-85, ISBN 978-3-031-18408-6, Salamanca, Septiembre, 2022
https://doi.org/10.1007/978-3-031-18409-3_8
GiCSI
Comparative analysis of lattice-based post-quantum cryptosystems
M.A. González de la Torre, L. Hernández Encinas and J.I. Sánchez García
XVII Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2022), Actas 121-126, D. Sadornil Renedo (Ed.), Ediciones Universidad de Cantabria, Santander, Octubre 19-21, 2022
ISBN: 978-84-19024-14-5
GiCSI
State of the Art of Cybersecurity in Cooperative, Connected and Automated Mobility
Castillo Campo, Ó., Gayoso Martínez, V., Hernández Encinas, L., Martín Muñoz, A., Álvarez Fernández, R.
P. García Bringas et al. (Eds.), Springer, Lecture Notes in Networks and Systems 523, 104–113, ISBN 978-3-031-18408-6, Salamanca, Septiembre, 2022
https://doi.org/10.1007/978-3-031-18409-3_11
GiCSI
Biometrics and Artificial Intelligence: Attacks and Challenges
L. Hernández-Álvarez, L. González-Manzano, J.M. Fuentes and L. Hernández Encinas
pp. 213–240 in the book “Breakthroughs in Digital Biometrics and Forensics”, Springer, 2022
https://doi.org/10.1007/978-3-031-10706-1_10
GiCSI
Proceedings
Comparative analysis of lattice-based post-quantum cryptosystems
M.A. González de la Torre, L. Hernández Encinas and J.I. Sánchez García
XVII Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2022), Actas 121–126, D. Sadornil Renedo (Ed.), Ediciones Universidad de Cantabria. Santander, Octubre 19–21, 2022
ISBN: 978-84-19024-14-5
GiCSI
Año:
Libros y Capítulos de Libro
About the FrodoKEM lattice-based algorithm
M. A. González de la Torre, L. Hernández Encinas and A. Queiruga Dios
Proc. VII Jornadas Nacionales de Investigación en Ciberseguridad (JNIC'2022), 253-256, J. M. de Fuentes, L. González, J. C. Sancho, A. Ayerbe and M. L. Escalante (Eds.), Bilbao, June 27-29, 2022
ISBN: 978-84-88734-13-6
GiCSI
Año: 2024
Proceedings
Futuros Estándares de la Criptografía Postcuántica
Luis Hernández Encinas
Congreso Bienal de la Real Sociedad Matemática Española (RSME), Sesión especial de Criptografía, pág. 115, Pamplona, 23 de enero 2024
GiCSI
Análisis comparativo de las firmas digitales postcuánticas basadas en retículos
E. Iglesias Hernández, L. Hernández-Álvarez L. Hernández Encinas y J. I. Sánchez García
Actas de las IX Jornadas Nacionales de Investigación en Ciberseguridad (JNIC’2024), 2024, 404-411, Sevilla 27-29 mayo, 2024, ISBN: 978-84-09-62140-8
https://idus.us.es/handle/11441/160623
GiCSI
Ataques por canal lateral contra AES mediante correlación de consumo de potencia
M.A. González de la Torre, V. Sarasa Laborda, L. Hernández-Álvarez, I. Morales Sandoval, L. Hernández Encinas
IX Jornadas Nacionales de Investigación en Ciberseguridad (JNIC’2024), 2024, 420-427, Sevilla 27-29 mayo, 2024, ISBN: 978-84-09-62140-8
https://hdl.handle.net/11441/160773
GiCSI
Revistas JCR
Structural analysis of Code-based Algorithms of the NIST Post-Quantum Call
M. A. González de la Torre, L. Hernández Encinas and J. I. Sánchez García
Logic Journal of the IGPL
https://doi.org/10.1093/jigpal/jzae071
GiCSI
Cybersecurity trends in Cooperative, Connected and Automated Mobility
O. Castillo Campo, V. Gayoso Martínez, L. Hernández Encinas, A. Martín Muñoz, R. Álvarez Fernández,
Logic Journal of the IGPL, 2024, jzae072
https://doi.org/10.1093/jigpal/jzae072
GiCSI
Año: 2023
Proceedings
How to Attack a Galaxy: From Star Wars to Star Trek
L. Hernández-Álvarez, M. Á. G. de la Torre, E. I. Hernández and L. H. Encinas
Computer Science, Computer Engineering, & Applied Computing (CSCE), Las Vegas, NV, USA, 2023, pp. 2347-2354
https://doi.org/10.1109/CSCE60160.2023.00381
GiCSI
Regresar arriba
Congresos y reuniones, conferencias
2024
Situación actual de la Criptografía Postcuántica
Conferencia invitada

Luis Hernández Encinas
Jornada "CRIPTOLOGÍA POST-CUÁNTICA. UN ANÁLISIS DE LA SITUACIÓN".
Cículo de Tecnologías para la Defensa y la Seguridad
Madrid, 28 de febrero de 2024 
Escuela Técnica Superior de Ingenieros de Telecomunicación, Universidad Politécnica de Madrid, Madrid.

GiCSI
Futuros Estándares de la Criptografía Postcuántica
Presentación oral

Luis Hernández Encinas

Congreso Bienal de la Real Sociedad Matemática Española

Del 22 al 26 de enero de 2024, Pamplona, España.

GiCSI
2023
How to attack a galaxy: from Star Wars to Star Trek
Presentación oral

L. Hernández-Álvarez, M.A. González de la Torre, E. Iglesias Hernández, and L. Hernández Encinas

2023 International Conference on Security and Management (Worldcomp-SAM’23)

Del 24 al 27 de julio de 2023, Las Vegas, EE.UU.

GiCSI
2022
Comparative analysis of lattice-based post-quantum cryptosystems
Presentación oral

M.A. González de la Torre, L. Hernández Encinas and J.I. Sánchez García
XVII Reunión Españoña Sobre Criptología y Seguridad de la Información (RECSI 2022)
Del 19 al 21 de octubre de 2022, Santander, España.

GiCSI
Cibersecurity in Future Connected Societies
Organización de congresos

Special Session organized by Víctor Gayoso Martínez (Institute of Physical and Information Technologies, Spanish National Research Council, CSIC) and Professor Koji Ishibashi (University of Electrocommunications, Japan) as part of the 15th International Conference on Computational Intelligence in Security for Information Systems (CISIS) that will be held in Salamanca (Spain) in September 2022.

For more information, visit http://www.2022.cisisconference.eu/accepted-special-sessions/

GiCSI
Regresar arriba

Datos del proyecto

ORACLE
Plan Estatal de Investigación Científica y Técnica y de Innovación 2017-2020, Programa Estatal de I+D+i Orientada a los Retos de la Sociedad (AEI)
PCI2020-120691-2
Investigador principal
Luis Hernández Encinas
Otros participantes ITEFI
Agustín Martín Muñoz
David Arroyo Guardeño
Miguel Ángel González de la Torre
Other personnel involved:

Prof. Dr. Giuseppe Abreu, Jacobs University Bremen (JUB y coordinador de la parte europea y del proyecto).
Prof. Dr. Koji Ishibashi, The University of ElectroCommunications at Tokyo (UEC y coordinador de la parte japonesa).
Dr. Kaya Demir, Scientific and Technological Research Council of Turkey (TÜBITAK).
Prof. Dr. Naoki Ishikawa, Yokohama National University (YNU).
Prof. Dr. Koya Sato, Tokyo University of Science (TUS)

Inicio: 01-04-2021 Finalización: 01-03-2024
Página web del consorcio
GiCSI GiCP
Acoustics and Non Destructive Evaluation (DAEND)
  • Environmental Acoustics (GAA)
  • G Carma: Materials Characterization by Non Destructive Evaluation
  • ULAB, Ultrasounds for Liquid Analysis and Bioengineering
Information and Communication Technologies (TIC)
  • Cybersecurity and Privacy Protection Research Group (GiCP)
  • Research group on Cryptology and Information Security (GiCSI)
    • Quantum Communications Laboratory (LCQE)
  • Multichannel Ultrasonic Signal Processing Group (MUSP)
Sensors and Ultrasonic Systems (DSSU)
  • Ultrasonic Systems and Technologies (USTG)
  • Nanosensors and Smart Systems (NoySi)
  • Ultrasonic Resonators for cavitation and micromanipulation (RESULT)
  • Advanced Sensor Technology (SENSAVAN)
  • Quantum Electronics (QE)
Laboratorios
  • Laboratorio de Acústica
  • Laboratorio de Metrología Ultrasónica Médica (LMUM)
  • Laboratorio de Comunicaciones Cuánticas
  • Laboratory for International Collaboration in Advanced Biophotonics Imaging

Instituto de Tecnologías Físicas y de la Información Leonardo Torres Quevedo  - ITEFI
C/ Serrano, 144. 28006 - Madrid • Tel.: (+34) 91 561 88 06  Contacto  •  Intranet
EDIFICIO PARCIALMENTE ACCESIBLE POR PERSONAS CON MOVILIDAD REDUCIDA