- Cognitive Radio Networks and Spectrum Sensing
- Algorithms and Data Compression
- Advanced MIMO Systems Optimization
- Software-Defined Networks and 5G
- Network Packet Processing and Optimization
- DNA and Biological Computing
- IoT and Edge/Fog Computing
- Power Line Communications and Noise
- Blockchain Technology Applications and Security
- Distributed Sensor Networks and Detection Algorithms
- Security and Verification in Computing
- Wireless Communication Networks Research
- Cooperative Communication and Network Coding
- Security in Wireless Sensor Networks
- Cloud Computing and Resource Management
- Cryptography and Data Security
- Privacy-Preserving Technologies in Data
- Access Control and Trust
- User Authentication and Security Systems
- Web Data Mining and Analysis
- Geotechnical Engineering and Underground Structures
- Network Security and Intrusion Detection
- Data-Driven Disease Surveillance
- Ethics in Clinical Research
- Image Enhancement Techniques
RUAG (Switzerland)
2023
University of Catania
2020-2022
Italian Society of Physiotherapy
2021
Scuola Superiore Sant'Anna
2017-2020
Bambino Gesù Children's Hospital
2020
Institute of Informatics and Telematics
2016-2018
Telecom Italia (Italy)
2018
University of Naples Federico II
2013-2016
University of Bologna
2014
Smart cities are demanding solutions for improved traffic efficiency, in order to guarantee optimal access mobility resources available urban areas. Intelligent video analytics deployed directly on board embedded sensors offers great opportunities gather highly informative data about and transport, allowing reconstruction of a real-time neat picture patterns. In this paper, we present visual sensor network which each node embeds computer vision logics analyzing real time traffic. The nodes...
Fake news on children's and adolescent health are spreading. Internet availability decreasing costs of media devices contributing to an easy access technology by families. Public organizations working contrast misinformation promote scientific communication. In this context, a new form communication is emerging social influencers. Aim study evaluate the role paediatric influencers (PI) in communicating information about children adolescents' health.A group PI was enrolled from December 2019...
In this paper, experimental results about secret key extraction from the physical parameters of an ultra-wideband (UWB) channel are presented. probing phase, reciprocity UWB is verified. A quantization scheme then proposed together with a alignment technique. The scheme, tested real measurements in indoor scenario, shown to yield raw keys good randomness properties and tolerable mismatch percentages between Alice Bob, as well unfavorable random error distribution for Eve.
Abstract Internet of Things (IoT) nodes participating in the implementation next‐generation IoT applications will need standard methods to authenticate each other and secure their communications. However, use certificates public key infrastructure (PKI) technologies, widely employed Internet, is not straightforward this context because limitations involved entities. This paper presents for (PKIoT) architecture, a solution which aims at enabling certificate‐based authentication forthcoming...
Fifth generation softwarized network systems will make it possible to flexibly partition the infrastructure into logically independent slices, hosting end-to-end services able dynamically meet diverse requirements of vertical industries. However, high dynamicity NFV-related operations and interdependence multiple slices running on top a shared underlying pose peculiar security challenges. In this article we investigate how such challenges can be addressed in context management orchestration...
The attractive characteristics of the TV White Space makes it ideal candidate for enabling multiple and independently-operated secondary networks via Cognitive Radio paradigm. However, so far, there are no regulatory requirements coexistence among heterogenous over TVWS. Hence, their mutual interference can be very severe. This issue is even more crucial in urban Smart Grid scenarios, where latency energy tight Neighborhood Area Networks (NANs) likely to located within same geographical...
The paper deals with the reduction of channel outage in a smart grid scenario since it plays crucial role on control performance Demand/Response Management. A study two-way cognitive-based switching procedure is carried out and tools for optimum sensing-time evaluation are provided. Such considers cost function that takes into account both sensing-accuracy improvement gained by increasing sensing time transmission-capacity degradation induced increasing.
Due to its attractive characteristics, the TV white space (TVWS) spectrum is considered ideal candidate enable deployment of smart grid networks (SGNs) via cognitive radio paradigm. However, intermittent availability TVWS as well scarcity in urban scenarios could compromise tight requirements terms reliability, latency, and data rate. This degradation be even more severe when mobile nodes, e.g., electric vehicles, are considered. Stemming from this, we first develop an analytical framework...
The Vaccine Safety Net's Web Analytics Project (VSN-WAP) was launched in October 2017 to monitor the behavior of users visiting websites belonging VSN, a global network providing science-based information on vaccine safety. Participating could provide web metrics two ways: through Google (GA) script, which automatically forwarded central account and manual input (MI) reduced subset (Sessions, Page Views, New Users, Bounce Rate, Views/Session Average Session Duration), were pooled with...
Softwarization is a systemic trend which appears under several paradigms impacting networks, services and terminals evolution. Even the Internet of Things (IoT) scenario going to be affected by this revolution. The efforts that are being made provide IoT objects with embedded logic reconfiguration capabilities architectures defined support standard Machine-2-Machine (M2M) transactions clear expressions trend. In direction, powerful framework enable softwarization in constrained T-Res, where...
A key issue in spectrum sensing design is the optimization of time, namely, time that maximizes transmission throughput achievable by cognitive users (CUs), while limiting interference against primary user (PU). In a mobile network scenario, this becomes more challenging than associated with traditional case (i.e., stationary scenario), since addition to temporal PU activity, spatial effects due relative mobility between PUs and CUs have be also taken into account. fact, can deeply influence...
To fully unleash the potentials of cognitive radio (CR) paradigm, new challenges must be addressed. Specifically, as regards network layer, problem route priority, i.e., prioritizing routes for CR packet transmission, is crucial, since communication opportunities provided by a are deeply affected primary-user (PU) activity. Furthermore, whenever layer exploits proactively acquired information on PU activity, update packets need to exchanged among users, inducing so overhead independently...
In this paper, we address the choice of routing update period in Cognitive Radio Ad Hoc Networks with objective maximizing capacity available at an arbitrary node acting as source. To aim, first, problem is reformulated to account for slotted nature time induced by spectrum sensing functionality. Then, analytically derive source function through closed-form expressions. The mathematical analysis carried out adopting three different strategies and two PU activity models. theoretical validate...
The problem of choosing the route providing best communication opportunities among available routes is particularly challenging in self-organizing Cognitive Radio networks, since are deeply affected by primary-user (PU) activity. Furthermore, whenever selection exploits proactively acquired information on PU activity, routing update packets need to be periodically exchanged nodes. time interval between these exchanges, i.e., period, affects overall provided a route, regardless adopted...
MedCo is the first operational system that makes sensitive medical-data available for research in a simple, privacy-conscious and secure way. It enables consortium of clinical sites to collectively protect their data securely share them with investigators, without single points failure. In this short paper, we report on our ongoing effort deployment within context Swiss Personalized Health Network (SPHN) Molecular Tumor Board.
In this demo we show the functionalities of Open Source MANO extended with advanced authorization capabilities able to enhance security support in terms preservation virtual resources and slices integrity a dynamic context users, services resources. The presented extension consists Usage Control System integrated enhancing traditional operations ongoing usage control on established slices, user behaviour by continuously reconsidering granting light mutable attribute environment (e.g.,...
The increasing need for physical security in critical environment has led to a widespread of video surveillance systems. Effective systems should be able detect the presence unauthorized people monitored environments while preserving privacy authorized ones. To this aim, our paper proposes adoption usage control model scenario enforce policies that continuously whether person holds right stay give space (e.g., room) from moment when enters space. In some scenarios, is allowed room only under...
<p>“Costantinopoli” quarry is located in the hearth of “Vallo di Diano” Province Salerno. The reuse abandoned quarries aimed to define a number small “environmentally friendly” projects order counterbalance current environmental impact.</p><p>The project provides “new green economy” through development a<i>bio-agriculture</i>, a<i>bio- factory</i>and a<i>eco-sustainable research</i>and combines ecology, horticulture, science, art,...
Mobile users have got used to getting useful information while they are literally on the move. An implication of this habit is that certain live information, such as for navigation, dating and handling emergencies, should be tailored user's current location. While technically feasible with technology, it raises concerns location privacy. To address delicate tradeoff between privacy appropriateness location, paper discusses three delivery protocols. One widely adopted Android's protocol,...