Savio Sciancalepore

ORCID: 0000-0003-0974-3639
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Security in Wireless Sensor Networks
  • Vehicular Ad Hoc Networks (VANETs)
  • UAV Applications and Optimization
  • Wireless Communication Security Techniques
  • Advanced Malware Detection Techniques
  • Network Security and Intrusion Detection
  • Cryptography and Data Security
  • Wireless Signal Modulation Classification
  • Privacy-Preserving Technologies in Data
  • Anomaly Detection Techniques and Applications
  • Cryptographic Implementations and Security
  • IoT and Edge/Fog Computing
  • Indoor and Outdoor Localization Technologies
  • Internet Traffic Analysis and Secure E-voting
  • User Authentication and Security Systems
  • Advanced Authentication Protocols Security
  • Air Traffic Management and Optimization
  • Smart Grid Security and Resilience
  • Privacy, Security, and Data Protection
  • Opportunistic and Delay-Tolerant Networks
  • Video Surveillance and Tracking Methods
  • Access Control and Trust
  • Satellite Communication Systems
  • Hate Speech and Cyberbullying Detection
  • Energy Efficient Wireless Sensor Networks

Eindhoven University of Technology
2021-2025

Hamad bin Khalifa University
2018-2020

Khalifa University of Science and Technology
2020

Polytechnic University of Bari
2014-2018

Consorzio Nazionale Interuniversitario per le Telecomunicazioni
2017

Engineering (Italy)
2016

Instituto Politécnico Nacional
2015

Satellite-based Communication (SATCOM) systems are gaining renewed momentum in Industry and Academia, thanks to innovative services introduced by leading tech companies the promising impact they can deliver towards global connectivity objective tackled early 6G initiatives. On one hand, emergence of new manufacturing processes radio technologies promises reduce service costs while guaranteeing outstanding communication latency, available bandwidth, flexibility, coverage range. other...

10.1016/j.comnet.2022.109246 article EN cc-by Computer Networks 2022-08-03

Computational complexity of public key cryptography over sensor nodes is not anymore a blocking concern in modern devices which natively (and efficiently) support elliptic curve cryptography. The problem has rather shifted toward the significant airtime consumption required to exchange multiple messages and certificates so as perform authentication agreement. This letter addresses such by exploiting implicit (elliptic Qu-Vanstone). We specifically propose novel management protocol (KMP)...

10.1109/les.2016.2630729 article EN IEEE Embedded Systems Letters 2016-11-18

Physical-layer security is regaining traction in the research community, due to performance boost introduced by deep learning classification algorithms. This particularly true for sender authentication wireless communications via radio fingerprinting. However, previous mainly focused on terrestrial devices while, best of our knowledge, none work considered satellite transmitters. The scenario generally challenging because, among others, transducers feature non-standard electronics (usually...

10.1109/tifs.2022.3219287 article EN cc-by IEEE Transactions on Information Forensics and Security 2022-11-04

This paper proposes a Key Management Protocol for mobile and industrial Internet of Things systems, targeting, at the same time, robust key negotiation, lightweight node authentication, fast re-keying, efficient protection against replay attacks. The proposed approach pragmatically leverages widely accepted Elliptic Curve Cryptography constructions, specifically (Elliptic Curve) "Fixed" Diffie Hellman exchange Qu-Vanstone implicit certificates. Our value added is their suitable integration...

10.1145/2753476.2753477 article EN 2015-05-11

While the Internet of Things is breaking into market, controlled access to constrained resources still remains a blocking concern. Unfortunately, conventional solutions already accepted for both web and cloud applications cannot be directly used in this context. In fact, they generally require high computational bandwidth capabilities (that are impossible reach with devices) offer poor interoperability against standardized communication protocols Things. To solve issue, contribution presents...

10.1109/iscc.2017.8024606 article EN 2022 IEEE Symposium on Computers and Communications (ISCC) 2017-07-01

Vessels cybersecurity is recently gaining momentum, as a result of few recent attacks to vessels at sea.These have shacked the maritime domain, which was thought be relatively immune cyber threats.The cited belief now over, proved by mandates issued International Maritime Organization (IMO).According these regulations, all should subject risk analysis, and technical controls adopted mitigate resulting risks.This initiative laudable since, despite incidents, vulnerabilities threats affecting...

10.1109/mcom.001.1900632 article EN IEEE Communications Magazine 2020-06-01

Certificateless public-key cryptography (CL-PKC) schemes are particularly robust against the leakage of secret information stored on a trusted third party (TTP). These security features relevant for Internet Things (IoT) domains, where devices typically preconfigured with keys, usually locally TTP following maintenance tasks. Despite some contributions already proposed adoption CL-PKC in constrained IoT devices, current solutions generally require high message overhead, computationally...

10.1109/jiot.2019.2953549 article EN IEEE Internet of Things Journal 2019-11-15

The recent advancements in hardware miniaturization capabilities have boosted the diffusion of systems based on Energy Harvesting (EH) technologies, as a means to power embedded wireless devices sustainable and low-cost fashion. Despite undeniable management advantages, intermittent availability energy source limited supply has led challenging system trade-offs, resulting an increased attack surface general relaxation available security services. In this paper, we survey issues,...

10.1109/comst.2020.3017665 article EN IEEE Communications Surveys & Tutorials 2020-01-01

We tackle the problem of identifying trajectory a moving radio source from Time Arrival (TOA) measurements collected by set cooperating receivers. The considered system is completely asynchronous: nodes clocks are affected unknown time and frequency offsets, no control exerted over packet transmission times. In proposed solution, receiver clock offset terms estimated TOA on packets originated non-cooperative reference transmitters, possibly but not necessarily coincidental with Transmission...

10.1109/tmc.2018.2792443 article EN IEEE Transactions on Mobile Computing 2018-01-12

The recent worldwide introduction of RemoteID (RID) regulations forces all Unmanned Aircrafts (UAs), a.k.a. drones, to broadcast in plaintext on the wireless channel their identity and real-time location, for accounting monitoring purposes. Although improving drones' situational awareness, RID rule also generates significant privacy concerns UAs' operators, threatened by ease tracking UAs related confidentiality connected with broadcasting information. In this paper, we propose $A^2RID$, a...

10.1109/jiot.2023.3240477 article EN IEEE Internet of Things Journal 2023-01-30

Cyber Spectrum Intelligence (SpecInt) is emerging as a concept that extends beyond basic {\em spectrum sensing} and signal intelligence} to encompass broader set of capabilities technologies aimed at monitoring the use radio extracting information. SpecInt merges traditional sensing techniques with Artificial (AI) parallel processing enhance ability extract correlate simultaneous events occurring on various frequencies, allowing for new wave intelligence applications. This paper provides an...

10.48550/arxiv.2501.03977 preprint EN arXiv (Cornell University) 2025-01-07

We propose a methodology to detect the current status of powered-on drone (flying or at rest), leveraging just communication traffic exchanged between and its Remote Controller (RC). Our solution, other than being first kind, does not require either any special hardware transmit signal; it is built applying standard classification algorithms eavesdropped traffic, analyzing features such as packets inter-arrival time size. Moreover, fully passive resorts cheap general purpose hardware. To...

10.1145/3324921.3328791 article EN 2019-05-15

The Global Positioning System (GPS) has been proved to be exposed several cybersecurity attacks, due its intrinsic insecure design. GPS spoofing is one of the most easiest, cheap, and dreadful attacks that can delivered: fake signals sent a target device make it moving according pre-computed path.

10.1145/3317549.3319719 article EN 2019-05-15

The increasing integration of information and communication technologies has undoubtedly boosted the efficiency Critical Infrastructures (CI). However, first wave IoT devices, together with management enormous amount data generated by modern CIs, created serious architectural issues. While emerging Fog Multi-Access Edge Computing (FMEC) paradigms can provide a viable solution, they also bring inherent security issues, that cause dire consequences in context CIs. In this paper, we analyze...

10.1109/eurospw.2019.00007 article EN 2019-06-01

While enabling brand new services and opportunities, the federation of vertical Internet Things platforms presents challenges in terms secure controlled access to heterogeneous resources, especially when authorization permissions must be regulated by multiple decentralized authorities. The work presented herein designs, develops, experimentally validates a flexible effective attribute-based control framework, properly devised operate federated cloud-assisted cyber-physical system (CPS). Our...

10.1109/jiot.2018.2864300 article EN IEEE Internet of Things Journal 2018-08-08

The Automatic Dependent Surveillance - Broadcast (ADS-B) technology, already deployed by the major avionics companies (e.g., QatarAirways and AmericanAirlines), will become mandatory on board of civil military aircraft flying in Class A, B, C airspaces 2020, enabling direct airplanes communications enhanced flights monitoring. However, ADS-B has been designed without security considerations, thus being vulnerable to a variety attacks, including message injection messages order manipulation...

10.1109/tdsc.2019.2934446 article EN IEEE Transactions on Dependable and Secure Computing 2019-01-01

In this paper, we study the privately-own IRIDIUM satellite constellation, to provide a location service that is independent of GNSS. particular, apply our findings propose new GNSS spoofing detection solution, exploiting unencrypted Ring Alert (IRA) messages are broadcast by satellites. We firstly reverse-engineer many parameters such as satellites speed, packet interarrival times, maximum coverage, pass duration, and beam name few. Later, adopt aforementioned statistics create detailed...

10.1145/3395351.3399350 preprint EN 2020-07-08

Automatic Identification System (AIS) is the de-facto communication standard used by vessels to broadcast identification and position information. However, being AIS communications neither encrypted nor authenticated, they can be eavesdropped spoofed adversaries, leading potentially threatening scenarios. Existing solutions, including ones conceived in avionics domain, do not consider integration with standard, provide protection against rogue messages flooding. In this article, we propose...

10.1109/tdsc.2021.3069428 article EN IEEE Transactions on Dependable and Secure Computing 2021-03-30

The increasing popularity of autonomous and remotely-piloted drones has paved the way for several use-cases application scenarios, including merchandise delivery, surveillance, warfare, to cite a few. In many estimating with zero-touch weight payload carried by drone before it approaches could be particular interest, e.g., provide early tampering detection when is sensitively different from expected one. To best our knowledge, we are first investigate possibility remotely detect commercial...

10.1016/j.future.2022.03.041 article EN cc-by Future Generation Computer Systems 2022-04-05

Current collision avoidance techniques deployed on Unmanned Aerial Vehicles (UAVs) rely short-range sensors, such as proximity cameras, and microphones. Unfortunately, their efficiency is significantly limited in several situations; for instance, when a remote UAV approaches at high velocity, or the surrounding environment impaired (e.g., fog, noise). In cited cases, to avoid collisions maintain self-separation, UAVs often indiscriminate broadcast of location. Therefore, an adversary could...

10.1109/tdsc.2022.3159837 article EN IEEE Transactions on Dependable and Secure Computing 2022-03-16

We propose Strength of Crowd (SoC), a distributed Internet Things (IoT) protocol that guarantees message broadcast from an initiator to all network nodes in the presence either reactive or proactive jammer, targets variable portion radio spectrum. SoC exploits simple, yet innovative and effective idea: not (currently) involved process transmit decoy messages cannot be distinguished (by jammer) real ones. Therefore, jammer has implement best-effort strategy jam concurrent communications up...

10.3390/s18103492 article EN cc-by Sensors 2018-10-16
Coming Soon ...