This page has only limited features, please log in for full access.

Prof. Roberto Andrade
Escuela Politécnica Nacional-Ecuador

Basic Info


Research Keywords & Expertise

0 Technology
0 Cognitive
0 Cybersecurity
0 Networking and IoT
0 Bigdata computing & intelligence

Honors and Awards

The user has no records in this section


Career Timeline

The user has no records in this section.


Short Biography

The user biography is not available.
Following
Followers
Co Authors
The list of users this user is following is empty.
Following: 0 users

Feed

Journal article
Published: 06 April 2021 in Applied Sciences
Reads 0
Downloads 0

The inclusion of Internet of Things (IoT) for building smart cities, smart health, smart grids, and other smart concepts has driven data-driven decision making by managers and automation in each domain. However, the hyper-connectivity generated by IoT networks coupled with limited default security in IoT devices increases security risks that can jeopardize the operations of cities, hospitals, and organizations. Strengthening the security aspects of IoT devices prior to their use in different systems can contribute to minimize the attack surface. This study aimed to model a sequence of seven steps to minimize the attack surface by executing hardening processes. Conducted a systematic literature review using Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) techniques. In this way, we were able to define a proposed methodology to evaluate the security level of an IoT solution by means of a checklist that considers the security aspects in the three layers of the IoT architecture. A risk matrix adapted to IoT is established to evaluate the attack surface. Finally, a process of hardening and vulnerability analysis is proposed to reduce the attack surface and improve the security level of the IoT solution.

ACS Style

Aarón Echeverría; Cristhian Cevallos; Ivan Ortiz-Garces; Roberto Andrade. Cybersecurity Model Based on Hardening for Secure Internet of Things Implementation. Applied Sciences 2021, 11, 3260 .

AMA Style

Aarón Echeverría, Cristhian Cevallos, Ivan Ortiz-Garces, Roberto Andrade. Cybersecurity Model Based on Hardening for Secure Internet of Things Implementation. Applied Sciences. 2021; 11 (7):3260.

Chicago/Turabian Style

Aarón Echeverría; Cristhian Cevallos; Ivan Ortiz-Garces; Roberto Andrade. 2021. "Cybersecurity Model Based on Hardening for Secure Internet of Things Implementation." Applied Sciences 11, no. 7: 3260.

Chapter
Published: 07 March 2021 in Advances in Sustainability Science and Technology
Reads 0
Downloads 0

The management and consumption of resources in cities in sustainable way have been considered a relevant issue worldwide. For that reason, the New Urban Agenda defines a set of sustainable development objectives-SDG for the year 2030. On the other hand, consumerism behaviors by people have had a considerable increase since of the Second World War period. Achieving sustainability objectives requires the establishment of policies and standards as enabling elements, but they must go hand in hand with a cultural change on the people aligned with the strategies to achieve sustainability. The purpose of this study is the development of a comprehensive analysis of the cultural beliefs that influence in the behavioral aspects of people and how they could affect the achievement of the development of sustainability in cities and how some technologies like big data, IoT, and IA, can be used to analyze these behaviors and improve the decision-making processes in city managers.

ACS Style

María Cazares; Roberto O. Andrade; Julio Proaño; Iván Ortiz. Study of Technological Solutions in the Analysis of Behavioral Factors for Sustainability Strategies. Advances in Sustainability Science and Technology 2021, 175 -188.

AMA Style

María Cazares, Roberto O. Andrade, Julio Proaño, Iván Ortiz. Study of Technological Solutions in the Analysis of Behavioral Factors for Sustainability Strategies. Advances in Sustainability Science and Technology. 2021; ():175-188.

Chicago/Turabian Style

María Cazares; Roberto O. Andrade; Julio Proaño; Iván Ortiz. 2021. "Study of Technological Solutions in the Analysis of Behavioral Factors for Sustainability Strategies." Advances in Sustainability Science and Technology , no. : 175-188.

Chapter
Published: 23 February 2021 in Advances in Cybersecurity Management
Reads 0
Downloads 0

During the COVID-19 pandemic, fake news has increased considerably. Although fake news is a social problem that has existed for a long time, in the COVID-19 context, it has put people’s lives at risk. Nowadays, a massive amount of information is available, and organizations attempt to send official statements to citizens. However, some factors can support people’s decision to accept an idea as real even though it will be risky. This study is exploratory and descriptive research that aims to establish the human factors that make the standard user susceptible to cyber-attacks in times of pandemic. A literature review of cybersecurity attacks and conflict scenarios registered during the COVID-19 pandemic was first applied during the investigation. After coding them, the Diamond Model was applied, representing the analysis of cybersecurity intrusions, which emphasizes the relationships and features of the four main elements of an intrusion: adversary, infrastructure, capacity, and victim. With this input, several innovative strategies are proposed to minimize attacks by advanced threat actors and their impact on users. These strategies are useful for governments to improve communication with citizens and develop critical thinking on citizens to face fake news.

ACS Style

Roberto O. Andrade; María Cazares; Walter Fuertes. Cybersecurity Attacks During COVID-19: An Analysis of the Behavior of the Human Factors and a Proposal of Hardening Strategies. Advances in Cybersecurity Management 2021, 37 -53.

AMA Style

Roberto O. Andrade, María Cazares, Walter Fuertes. Cybersecurity Attacks During COVID-19: An Analysis of the Behavior of the Human Factors and a Proposal of Hardening Strategies. Advances in Cybersecurity Management. 2021; ():37-53.

Chicago/Turabian Style

Roberto O. Andrade; María Cazares; Walter Fuertes. 2021. "Cybersecurity Attacks During COVID-19: An Analysis of the Behavior of the Human Factors and a Proposal of Hardening Strategies." Advances in Cybersecurity Management , no. : 37-53.

Journal article
Published: 22 December 2020 in IEEE Access
Reads 0
Downloads 0

Smart cities exploit emerging technologies such as Big Data, the Internet of Things (IoT), Cloud Computing, and Artificial Intelligence (AI) to enhance public services management. The use of IoT allows detecting and reporting specific parameters related to different domains of the city, such as health, waste management, agriculture, transportation, and energy. LoRa technologies, for instance, are used to develop IoT solutions for several smart city domains thanks to its available features, but sometimes people (i.e., citizens, information technology administrators, or city managers) might think that these available features involve cybersecurity risks. This study explores the cybersecurity aspects that define an assessment model of cybersecurity maturity of IoT solutions to develop smart city applications. In that sense, we perform a systematic literature review based on a top-down approach of cybersecurity incident response in IoT ecosystems. Besides, we propose and validate a model based on risk levels to evaluate the IoT cybersecurity maturity in a smart city.

ACS Style

Roberto Omar Andrade; Sang Guun Yoo; Luis Tello-Oquendo; Ivan Ortiz-Garces. A Comprehensive Study of the IoT Cybersecurity in Smart Cities. IEEE Access 2020, 8, 228922 -228941.

AMA Style

Roberto Omar Andrade, Sang Guun Yoo, Luis Tello-Oquendo, Ivan Ortiz-Garces. A Comprehensive Study of the IoT Cybersecurity in Smart Cities. IEEE Access. 2020; 8 ():228922-228941.

Chicago/Turabian Style

Roberto Omar Andrade; Sang Guun Yoo; Luis Tello-Oquendo; Ivan Ortiz-Garces. 2020. "A Comprehensive Study of the IoT Cybersecurity in Smart Cities." IEEE Access 8, no. : 228922-228941.

Review
Published: 07 November 2019 in Applied Sciences
Reads 0
Downloads 0

The New Urban Agenda (Agenda 2030) adopted at the United Nations Conference related to Sustainable Urban Development (Habitat III) in the year 2016 has the goal of prompting cities to achieve the identified Sustainable Development Goals by the year 2030. In this context, cities can experiment strategies of circular economy for the optimization of resources, waste reduction, reuse, and recycling. The data generated by the components of an Internet of Things (IoT) ecosystem can contribute in two relevant ways to a smart city model: (1) by the generation of a circular economy and (2) by the creation of intelligence to improve the decision-making processes by citizens or city managers. In this context, it is in our interest to understand the most relevant axes of the research related to IoT, particularly those based on the LoRa technology. LoRa has attracted the interest of researchers because it is an open standard and contributes to the development of sustainable smart cities, since they are linked to the concepts of a circular economy. Additionally, the intention of this work is to identify the technological or practical barriers that hamper the development of solutions, find possible future trends that could exist in the context of smart cities and IoT, and understand how they could be exploited by the industry and academy.

ACS Style

Roberto Omar Andrade; Sang Guun Yoo. A Comprehensive Study of the Use of LoRa in the Development of Smart Cities. Applied Sciences 2019, 9, 4753 .

AMA Style

Roberto Omar Andrade, Sang Guun Yoo. A Comprehensive Study of the Use of LoRa in the Development of Smart Cities. Applied Sciences. 2019; 9 (22):4753.

Chicago/Turabian Style

Roberto Omar Andrade; Sang Guun Yoo. 2019. "A Comprehensive Study of the Use of LoRa in the Development of Smart Cities." Applied Sciences 9, no. 22: 4753.

Review
Published: 28 October 2019 in Applied Sciences
Reads 0
Downloads 0

The development and high growth of the Internet of Things (IoT) have improved quality of life and strengthened different areas in society. Many cities worldwide are looking forward to becoming smart. One of the most popular use cases in smart cities is the implementation of smart parking solutions, as they allow people to optimize time, reduce fuel consumption, and carbon dioxide emissions. Smart parking solutions have a defined architecture with particular components (sensors, communication protocols, and software solutions). Although there are only three components that compose a smart parking solution, it is important to mention that each component has many types that can be used in the deployment of these solutions. This paper identifies the most used types of every component and highlights usage trends in the established analysis period. It provides a complementary perspective and represents a very useful source of information. The scientific community could use this information to decide regarding the selection of types of components to implement a smart parking solution. For this purpose, herein we review several works related to smart parking solutions deployment. To achieve this goal, a semi-cyclic adaptation of the action research methodology combined with a systematic review is used to select papers related to the subject of study. The most relevant papers were reviewed to identify subcategories for each component; these classifications are presented in tables to mark the relevance of each paper accordingly. Trends of usage in terms of sensors, protocols and software solutions are analyzed and discussed in every section. In addition to the trends of usage, this paper determines a guide of complementary features from the type of components that should be considered when implementing a smart parking solution.

ACS Style

Jhonattan J. Barriga; Juan Sulca; José Luis León; Alejandro Ulloa; Diego Portero; Roberto Andrade; Sang Guun Yoo. Smart Parking: A Literature Review from the Technological Perspective. Applied Sciences 2019, 9, 4569 .

AMA Style

Jhonattan J. Barriga, Juan Sulca, José Luis León, Alejandro Ulloa, Diego Portero, Roberto Andrade, Sang Guun Yoo. Smart Parking: A Literature Review from the Technological Perspective. Applied Sciences. 2019; 9 (21):4569.

Chicago/Turabian Style

Jhonattan J. Barriga; Juan Sulca; José Luis León; Alejandro Ulloa; Diego Portero; Roberto Andrade; Sang Guun Yoo. 2019. "Smart Parking: A Literature Review from the Technological Perspective." Applied Sciences 9, no. 21: 4569.

Journal article
Published: 20 September 2019 in IEEE Access
Reads 0
Downloads 0

In the field of information security, there are several areas of study that are under development. Social engineering is one of them that addresses the multidisciplinary challenges of cyber security. Nowadays, the attacks associated with social engineering are diverse, including the so-called Advanced Persistent Threats (APTs). These have been the subject of numerous investigations; however, cybernetic attacks of similar nature as grooming have been excluded from these studies. In the last decade, various efforts have been made to understand the structure and approach of grooming from the field of computer science with the use of computational learning algorithms. Nevertheless, these studies are not aligned with information security. In this work, the study of grooming is formalized as a social engineering attack, contrasting its stages or phases with life cycles associated with APTs. To achieve this goal, we use a database of real cyber-pedophile chats; this information was refined and the Latent Dirichlet Allocation (LDA) topic modeling was applied to determine the stages of the attack. Once the number of stages was determined, we proceed to give them a linguistic context, and with the use of machine learning, a linear model was trained to obtain 97.6% of training accuracy. With these results, it was determined that the study of grooming could support research associated with social engineering and contribute to new fields of information security.

ACS Style

Patricio Zambrano; Jenny Torres; Luis Tello-Oquendo; Ruben Jacome; Marco E. Benalcazar; Roberto Andrade; Walter Fuertes. Technical Mapping of the Grooming Anatomy Using Machine Learning Paradigms: An Information Security Approach. IEEE Access 2019, 7, 142129 -142146.

AMA Style

Patricio Zambrano, Jenny Torres, Luis Tello-Oquendo, Ruben Jacome, Marco E. Benalcazar, Roberto Andrade, Walter Fuertes. Technical Mapping of the Grooming Anatomy Using Machine Learning Paradigms: An Information Security Approach. IEEE Access. 2019; 7 (99):142129-142146.

Chicago/Turabian Style

Patricio Zambrano; Jenny Torres; Luis Tello-Oquendo; Ruben Jacome; Marco E. Benalcazar; Roberto Andrade; Walter Fuertes. 2019. "Technical Mapping of the Grooming Anatomy Using Machine Learning Paradigms: An Information Security Approach." IEEE Access 7, no. 99: 142129-142146.

Journal article
Published: 05 July 2019 in Journal of Information Security and Applications
Reads 0
Downloads 0

Nowadays, IoT, cloud computing, mobile and social networks are generating a transformation in social processes. Nevertheless, this technological change rise to new threats and security attacks that produce new and complex cybersecurity scenarios with large volumes of data and different attack vectors that can exceeded the cognitive skills of security analysts. In this context, cognitive sciences can enhance the cognitive processes, which can help to security analysts to establish actions in less time and more efficiently within cybersecurity operations. This works presents a cognitive security model that integrates technological solutions such as Big Data, Machine Learning, and Support Decision Systems with the cognitive processes of security analysts used to generate knowledge, understanding and execution of security response actions. The model considers alternatives to establish the automation process in the execution of cognitive tasks defined in the cyber operations processes and includes the analyst as the central axis in the processes of validation and decision making through the use of MAPE-K, OODA and Human in the Loop.

ACS Style

Roberto O Andrade; Sang Guun Yoo. Cognitive security: A comprehensive study of cognitive science in cybersecurity. Journal of Information Security and Applications 2019, 48, 102352 .

AMA Style

Roberto O Andrade, Sang Guun Yoo. Cognitive security: A comprehensive study of cognitive science in cybersecurity. Journal of Information Security and Applications. 2019; 48 ():102352.

Chicago/Turabian Style

Roberto O Andrade; Sang Guun Yoo. 2019. "Cognitive security: A comprehensive study of cognitive science in cybersecurity." Journal of Information Security and Applications 48, no. : 102352.

Conference paper
Published: 29 January 2019 in Advances in Intelligent Systems and Computing
Reads 0
Downloads 0

This work presents the literature review about the process of handling security incidents to identify standards or guidelines published by international organizations. Based on this research we identified the phases of the incident management processes with the goal of analyze automation proposals for improve efficiency and response times. Finally, we analyzed the contribution of cognitive security to enhanced the cognitive skills of security specialists in the execution of tasks that are associated with the detection phase in the incident management process.

ACS Style

Roberto Andrade; Jenny Torres; Susana Graciela Cadena-Vela. Cognitive Security for Incident Management Process. Advances in Intelligent Systems and Computing 2019, 612 -621.

AMA Style

Roberto Andrade, Jenny Torres, Susana Graciela Cadena-Vela. Cognitive Security for Incident Management Process. Advances in Intelligent Systems and Computing. 2019; ():612-621.

Chicago/Turabian Style

Roberto Andrade; Jenny Torres; Susana Graciela Cadena-Vela. 2019. "Cognitive Security for Incident Management Process." Advances in Intelligent Systems and Computing , no. : 612-621.