Salvatore D’Oro

ORCID: 0000-0002-7690-0449
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software-Defined Networks and 5G
  • Advanced MIMO Systems Optimization
  • Wireless Signal Modulation Classification
  • Full-Duplex Wireless Communications
  • Cooperative Communication and Network Coding
  • Energy Harvesting in Wireless Networks
  • IoT and Edge/Fog Computing
  • Internet Traffic Analysis and Secure E-voting
  • Wireless Communication Security Techniques
  • Caching and Content Delivery
  • Radar Systems and Signal Processing
  • Wireless Body Area Networks
  • Opportunistic and Delay-Tolerant Networks
  • Cognitive Radio Networks and Spectrum Sensing
  • Network Security and Intrusion Detection
  • Advanced Wireless Communication Technologies
  • Advanced Wireless Network Optimization
  • Mobile Ad Hoc Networks
  • IoT Networks and Protocols
  • UAV Applications and Optimization
  • Wireless Networks and Protocols
  • Energy Efficient Wireless Sensor Networks
  • Distributed Control Multi-Agent Systems
  • Security in Wireless Sensor Networks
  • Blockchain Technology Applications and Security

Northeastern University
2018-2024

Boston University
2019-2024

Universidad del Noreste
2020-2021

University of Catania
2013-2018

The Open Radio Access Network (RAN) and its embodiment through the O-RAN Alliance specifications are poised to revolutionize telecom ecosystem. promotes virtualized RANs where disaggregated components connected via open interfaces optimized by intelligent controllers. result is a new paradigm for RAN design, deployment, operations: networks can be built with multivendor, interoperable components, programmatically centralized abstraction layer datadriven closed-loop control. Therefore,...

10.1109/comst.2023.3239220 article EN cc-by IEEE Communications Surveys & Tutorials 2023-01-01

The Internet of Things (IoT) realizes a vision where billions interconnected devices are deployed just about everywhere, from inside our bodies to the most remote areas globe. As IoT will soon pervade every aspect lives and be accessible anywhere, addressing critical security threats is now more important than ever. Traditional approaches applied as an afterthought "patch" against known attacks insufficient. Indeed, next-generation challenges require new secure-by-design vision, addressed...

10.1109/jiot.2018.2846040 article EN IEEE Internet of Things Journal 2018-06-11

Next generation (NextG) cellular networks will be natively cloud-based and built on programmable, virtualized, disaggregated architectures. The separation of control functions from the hardware fabric introduction standardized interfaces enable definition custom closed-control loops, which ultimately embedded intelligence real-time analytics, thus effectively realizing vision autonomous self-optimizing networks. This article explores network architecture proposed by O-RAN Alliance as a key...

10.1109/mcom.101.2001120 article EN IEEE Communications Magazine 2021-10-01

Radio fingerprinting uniquely identifies wireless devices by leveraging tiny hardware-level imperfections inevitably present in off-the-shelf radio circuitry. This way, can be directly identified at the physical layer analyzing unprocessed received waveform - thus avoiding energy-expensive upper-layer cryptography that resource-challenged embedded may not able to afford. Recent advances have proven convolutional neural networks (CNNs) thanks their multidimensional mappings achieve accuracy...

10.1109/infocom41043.2020.9155259 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2020-07-01

Due to the unprecedented scale of Internet Things, designing scalable, accurate, energy-efficient and tamper-proof authentication mechanisms has now become more important than ever. To this end, in paper we present ORACLE, a novel system based on convolutional neural networks (CNNs) “fingerprint” (i.e., identify) unique radio from large pool devices by deep-learning fine-grained hardware impairments imposed circuitry physical-layer I/Q samples. First, show how hardware-specific imperfections...

10.1109/tccn.2019.2949308 article EN publisher-specific-oa IEEE Transactions on Cognitive Communications and Networking 2019-10-24

Cellular networks are undergoing a radical transformation toward disaggregated, fully virtualized, and programmable architectures with increasingly heterogeneous devices applications. In this context, the open architecture standardized by O-RAN Alliance enables algorithmic hardware-independent Radio Access Network (RAN) adaptation through closed-loop control. introduces Machine Learning (ML)-based network control automation algorithms as so-called <italic...

10.1109/tmc.2022.3188013 article EN IEEE Transactions on Mobile Computing 2022-07-04

The next generation of cellular networks will be characterized by softwarized, open, and disaggregated architectures exposing analytics control knobs to enable network intelligence via innovative data-driven algorithms. How practically realize this vision, however, is largely an open problem. For a given optimization/automation objective, it currently unknown how select which models should deployed where, parameters control, feed them appropriate inputs. In paper, we take decisive step...

10.1109/infocom48880.2022.9796744 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2022-05-02

Radio fingerprinting provides a reliable and energy-efficient IoT authentication strategy by leveraging the unique hardware-level imperfections imposed on received wireless signal transmitter's radio circuitry. Most of existing approaches utilize hand-tailored protocol-specific feature extraction techniques, which can identify devices operating under pre-defined protocol only. Conversely, mapping inputs onto very large space, deep learning algorithms be trained to fingerprint populations any...

10.1145/3323679.3326503 article EN 2019-06-04

The notions of softwarization and virtualization the radio access network (RAN) next-generation (5G) wireless systems are ushering in a vision where applications services physically decoupled from devices infrastructure. This crucial aspect will ultimately enable dynamic deployment heterogeneous by different operators over same physical RAN slicing is form 5G that allows infrastructure owners to dynamically “slice” “serve” their resources (i. e., spectrum, power, antennas, among others)...

10.1109/infocom.2019.8737481 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2019-04-01

Colosseum is an open-access and publicly-available large-scale wireless testbed for experimental research via virtualized softwarized waveforms protocol stacks on a fully programmable, "white-box" platform. Through 256 state-of-the-art software-defined radios massive channel emulator core, can model virtually any scenario, enabling the design, development testing of solutions at scale in variety deployments conditions. These radio-frequency scenarios are reproduced through high-fidelity...

10.1109/dyspan53946.2021.9677430 preprint EN 2021-12-13

The Open Radio Access Network (Open RAN)-which is being standardized, among others, by the O-RAN Alliance-is bringing a radical transformation to cellular ecosystem through notions of disaggregation and RAN Intelligent Controllers (RICs). latter enable closed-loop control custom logic applications, namely xApps rApps, supporting decisions at different timescales. However, current specifications lack practical approach execute real-time loops operating timescales below 10ms. In this paper, we...

10.1109/mcom.002.2200079 article EN IEEE Communications Magazine 2022-08-05

The network function virtualization (NFV) paradigm has gained increasing interest in both academia and industry as it promises scalable flexible management orchestration. In NFV networks, services are provided chains of different virtual functions (VNFs), which instantiated executed on dedicated VNF-compliant servers. problem composing those is referred to the service chain composition problem. contrast centralized solutions that suffer from scalability privacy issues, this paper, we...

10.1109/jsac.2017.2659298 article EN IEEE Journal on Selected Areas in Communications 2017-01-26

In this paper, we consider a jammed wireless scenario where network operator aims to schedule users maximize performance while guaranteeing minimum level each user. We the case no information about position and triggering threshold of jammer is available. show that maximization problem can be modeled as finite-horizon joint power control user scheduling problem, which NP-hard. To find optimal solution exploit dynamic programming techniques. obtained decomposed, i.e., sequentially solved at...

10.1109/tnet.2016.2622002 article EN IEEE/ACM Transactions on Networking 2016-11-15

Networks of Unmanned Aerial Vehicles (UAVs), composed hundreds, possibly thousands highly mobile and wirelessly connected flying drones will play a vital role in future Internet Things (IoT) 5G networks. However, how to control UAV networks an automated scalable fashion distributed, interference-prone, potentially adversarial environments is still open research problem. This article introduces SwarmControl, new software-defined framework for wireless based on distributed optimization...

10.1109/infocom41043.2020.9155231 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2020-07-01

Open Radio Access Network (RAN) architectures will enable interoperability, openness, and programmatic data-driven control in next generation cellular networks. However, developing scalable efficient algorithms that can generalize across diverse deployments optimize RAN performance is a complex feat, largely unaddressed as of today. Specifically, the ability to design for network inference requires at minimum (i) access large, rich, heterogeneous datasets; (ii) testing scale controlled but...

10.1109/wcnc51071.2022.9771908 article EN 2022 IEEE Wireless Communications and Networking Conference (WCNC) 2022-04-10

Radio access network (RAN) slicing is an effective methodology to dynamically allocate networking resources in 5G networks. One of the main challenges RAN that it provably NP-Hard problem. For this reason, we design near-optimal low-complexity distributed algorithms. First, model problem as a congestion game, and demonstrate such game admits unique <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">Nash equilibrium</i> (NE). Then, evaluate...

10.1109/tnet.2018.2878965 article EN publisher-specific-oa IEEE/ACM Transactions on Networking 2018-11-12

Softwarization of networks allows simplifying deployment, configuration, and management network functions. The driving force toward this evolution is represented by software defined networking that more flexible dynamic resource allocation management. efficient orchestration resources extreme importance for softwarization process, many centralized solutions have been proposed. However, they are complex exhibit scalability issues. So, distributed to be preferred but, in order effective,...

10.1109/jsac.2017.2672278 article EN IEEE Journal on Selected Areas in Communications 2017-02-20

Current cellular networks rely on closed and inflexible infrastructure tightly controlled by a handful of vendors. Their configuration requires vendor support lengthy manual operations, which prevent Telco Operators (TOs) from unlocking the full network potential performing fine grained performance optimization, especially per-user basis. To address these key issues, this paper introduces CellOS, fully automated optimization management framework for that negligible intervention...

10.1016/j.comnet.2020.107380 article EN cc-by-nc-nd Computer Networks 2020-06-26

Network slicing of multi-access edge computing (MEC) resources is expected to be a pivotal technology the success 5G networks and beyond. The key challenge that sets MEC apart from traditional resource allocation problems nodes depend on tightly-intertwined strictly-constrained networking, computation storage resources. Therefore, instantiating slices without incurring in over-provisioning hardly addressable with existing algorithms. main innovation this paper Sl-EDGE, unified framework...

10.1145/3397166.3409133 preprint EN 2020-10-08

The cellular networking ecosystem is being radically transformed by openness, softwarization, and virtualization principles, which will steer NextG networks toward solutions running on "white box" infrastructures. Telco operators be able to truly bring intelligence the network, dynamically deploying adapting its elements at run time according current conditions traffic demands. Deploying intelligent for softwarized networks, however, requires extensive prototyping testing procedures,...

10.1145/3458864.3466863 article EN 2021-06-22

The future mobile network has the complex mission of distributing available radio resources among various applications with different requirements. access slicing enables creation logical networks by isolating and using dedicated for each group applications. In this scenario, resource scheduling (RRS) is responsible slices to fulfill their service-level agreement (SLA) requirements, prioritizing critical while minimizing number intent violations. Moreover, ensuring that RRS can deal a high...

10.48550/arxiv.2501.00950 preprint EN arXiv (Cornell University) 2025-01-01
Coming Soon ...