Upcoming railway Traffic Management Systems, supported by advanced communication architectures are expected to contribute to higher safety levels in the railway transport service. In the last few years, railway communication architectures have migrated from a juxtaposition of different, and mostly proprietary, technological solutions, each of them addressing the particular requirements of a specific railway IT service, to a unique and integrated telecom open architecture based on GSM-R. However, several limitations have started to appear on GSM-R’s horizon when facing the emerging and future railway communication needs. Within this context, the following target scenario from the UIC (Union Internationale des Chemins de Fer) comes out: an European Railway IP network. This research work addresses a step further by promoting an European Railway Ethernet over IEEE802.16 transport network as a bearer for information, telephony and mobile telecom applications. In the telecom arena, the new emerging 4th generation mobile communication technologies have shortened the existing gap on high transmission data rate technologies for the high mobility scenario. One of these emerging technologies is the IEEE802.16 family of standards, commonly known as the WiMAX technology.
Modelo de establecimiento de sesiones a nivel de enlace entre estaciones finales en redes Ethernet
This thesis addresses the mechanisms to provide end-to-end security between Ethernet end nodes, without assuming an unaffordable computational burden for the end devices. The overall objective of this thesis, namely the definition of a model for establishing secure sessions at the link layer between end computers of a LAN, as a prerequisite for the link-level protection of traffic exchanged between the two. This objective has required the definition of two aspects: first, a comprehensive framework that defines the entities involved, their roles, their relationship and how to organize themselves internally to achieve stated objective and on the other side, an authentication and key establishment protocol that can be integrated in this framework for use in establishing secure sessions.
Protocolo de distribución de contenidos digitales marcados en Internet, con protección de copyright. Evaluación y optimización de la seguridad del protocolo mediante análisis de riesgos
The digitalization of the information has made it possible, for a vast number of new opportunities in the most diverse economic sectors to appear, which, by the use of new technologies, are greatly reducing the cost of the different processes involved. At the same time, the deployment and development of the Internet has given them the possibility to use new schemes for the distribution of contents, which are faster and cheaper than the traditional ones, as well as immediate access to a worldwide potential market. However this new situation has come together with an increased easiness for the illicit access to these products by, potentially, millions of users, who can later on interchange these contents easily by means of the Internet, infringing the copyright mark which most of these products normally carry. These practices, collectively known as “piracy”, can be considered the most worrying prospect to almost all the agents in this sector, and hence this is the reason why these agents constantly foster the development of answers and solutions to the copyright infringement in e-commerce.