- Security in Wireless Sensor Networks
- Vehicular Ad Hoc Networks (VANETs)
- UAV Applications and Optimization
- Wireless Communication Security Techniques
- Advanced Malware Detection Techniques
- Network Security and Intrusion Detection
- Cryptography and Data Security
- Wireless Signal Modulation Classification
- Privacy-Preserving Technologies in Data
- Anomaly Detection Techniques and Applications
- Cryptographic Implementations and Security
- IoT and Edge/Fog Computing
- Indoor and Outdoor Localization Technologies
- Internet Traffic Analysis and Secure E-voting
- User Authentication and Security Systems
- Advanced Authentication Protocols Security
- Air Traffic Management and Optimization
- Smart Grid Security and Resilience
- Privacy, Security, and Data Protection
- Opportunistic and Delay-Tolerant Networks
- Video Surveillance and Tracking Methods
- Access Control and Trust
- Satellite Communication Systems
- Hate Speech and Cyberbullying Detection
- Energy Efficient Wireless Sensor Networks
Eindhoven University of Technology
2021-2025
Hamad bin Khalifa University
2018-2020
Khalifa University of Science and Technology
2020
Polytechnic University of Bari
2014-2018
Consorzio Nazionale Interuniversitario per le Telecomunicazioni
2017
Engineering (Italy)
2016
Instituto Politécnico Nacional
2015
Satellite-based Communication (SATCOM) systems are gaining renewed momentum in Industry and Academia, thanks to innovative services introduced by leading tech companies the promising impact they can deliver towards global connectivity objective tackled early 6G initiatives. On one hand, emergence of new manufacturing processes radio technologies promises reduce service costs while guaranteeing outstanding communication latency, available bandwidth, flexibility, coverage range. other...
Computational complexity of public key cryptography over sensor nodes is not anymore a blocking concern in modern devices which natively (and efficiently) support elliptic curve cryptography. The problem has rather shifted toward the significant airtime consumption required to exchange multiple messages and certificates so as perform authentication agreement. This letter addresses such by exploiting implicit (elliptic Qu-Vanstone). We specifically propose novel management protocol (KMP)...
Physical-layer security is regaining traction in the research community, due to performance boost introduced by deep learning classification algorithms. This particularly true for sender authentication wireless communications via radio fingerprinting. However, previous mainly focused on terrestrial devices while, best of our knowledge, none work considered satellite transmitters. The scenario generally challenging because, among others, transducers feature non-standard electronics (usually...
This paper proposes a Key Management Protocol for mobile and industrial Internet of Things systems, targeting, at the same time, robust key negotiation, lightweight node authentication, fast re-keying, efficient protection against replay attacks. The proposed approach pragmatically leverages widely accepted Elliptic Curve Cryptography constructions, specifically (Elliptic Curve) "Fixed" Diffie Hellman exchange Qu-Vanstone implicit certificates. Our value added is their suitable integration...
While the Internet of Things is breaking into market, controlled access to constrained resources still remains a blocking concern. Unfortunately, conventional solutions already accepted for both web and cloud applications cannot be directly used in this context. In fact, they generally require high computational bandwidth capabilities (that are impossible reach with devices) offer poor interoperability against standardized communication protocols Things. To solve issue, contribution presents...
Vessels cybersecurity is recently gaining momentum, as a result of few recent attacks to vessels at sea.These have shacked the maritime domain, which was thought be relatively immune cyber threats.The cited belief now over, proved by mandates issued International Maritime Organization (IMO).According these regulations, all should subject risk analysis, and technical controls adopted mitigate resulting risks.This initiative laudable since, despite incidents, vulnerabilities threats affecting...
Certificateless public-key cryptography (CL-PKC) schemes are particularly robust against the leakage of secret information stored on a trusted third party (TTP). These security features relevant for Internet Things (IoT) domains, where devices typically preconfigured with keys, usually locally TTP following maintenance tasks. Despite some contributions already proposed adoption CL-PKC in constrained IoT devices, current solutions generally require high message overhead, computationally...
The recent advancements in hardware miniaturization capabilities have boosted the diffusion of systems based on Energy Harvesting (EH) technologies, as a means to power embedded wireless devices sustainable and low-cost fashion. Despite undeniable management advantages, intermittent availability energy source limited supply has led challenging system trade-offs, resulting an increased attack surface general relaxation available security services. In this paper, we survey issues,...
We tackle the problem of identifying trajectory a moving radio source from Time Arrival (TOA) measurements collected by set cooperating receivers. The considered system is completely asynchronous: nodes clocks are affected unknown time and frequency offsets, no control exerted over packet transmission times. In proposed solution, receiver clock offset terms estimated TOA on packets originated non-cooperative reference transmitters, possibly but not necessarily coincidental with Transmission...
The recent worldwide introduction of RemoteID (RID) regulations forces all Unmanned Aircrafts (UAs), a.k.a. drones, to broadcast in plaintext on the wireless channel their identity and real-time location, for accounting monitoring purposes. Although improving drones' situational awareness, RID rule also generates significant privacy concerns UAs' operators, threatened by ease tracking UAs related confidentiality connected with broadcasting information. In this paper, we propose $A^2RID$, a...
Cyber Spectrum Intelligence (SpecInt) is emerging as a concept that extends beyond basic {\em spectrum sensing} and signal intelligence} to encompass broader set of capabilities technologies aimed at monitoring the use radio extracting information. SpecInt merges traditional sensing techniques with Artificial (AI) parallel processing enhance ability extract correlate simultaneous events occurring on various frequencies, allowing for new wave intelligence applications. This paper provides an...
We propose a methodology to detect the current status of powered-on drone (flying or at rest), leveraging just communication traffic exchanged between and its Remote Controller (RC). Our solution, other than being first kind, does not require either any special hardware transmit signal; it is built applying standard classification algorithms eavesdropped traffic, analyzing features such as packets inter-arrival time size. Moreover, fully passive resorts cheap general purpose hardware. To...
The Global Positioning System (GPS) has been proved to be exposed several cybersecurity attacks, due its intrinsic insecure design. GPS spoofing is one of the most easiest, cheap, and dreadful attacks that can delivered: fake signals sent a target device make it moving according pre-computed path.
The increasing integration of information and communication technologies has undoubtedly boosted the efficiency Critical Infrastructures (CI). However, first wave IoT devices, together with management enormous amount data generated by modern CIs, created serious architectural issues. While emerging Fog Multi-Access Edge Computing (FMEC) paradigms can provide a viable solution, they also bring inherent security issues, that cause dire consequences in context CIs. In this paper, we analyze...
While enabling brand new services and opportunities, the federation of vertical Internet Things platforms presents challenges in terms secure controlled access to heterogeneous resources, especially when authorization permissions must be regulated by multiple decentralized authorities. The work presented herein designs, develops, experimentally validates a flexible effective attribute-based control framework, properly devised operate federated cloud-assisted cyber-physical system (CPS). Our...
The Automatic Dependent Surveillance - Broadcast (ADS-B) technology, already deployed by the major avionics companies (e.g., QatarAirways and AmericanAirlines), will become mandatory on board of civil military aircraft flying in Class A, B, C airspaces 2020, enabling direct airplanes communications enhanced flights monitoring. However, ADS-B has been designed without security considerations, thus being vulnerable to a variety attacks, including message injection messages order manipulation...
In this paper, we study the privately-own IRIDIUM satellite constellation, to provide a location service that is independent of GNSS. particular, apply our findings propose new GNSS spoofing detection solution, exploiting unencrypted Ring Alert (IRA) messages are broadcast by satellites. We firstly reverse-engineer many parameters such as satellites speed, packet interarrival times, maximum coverage, pass duration, and beam name few. Later, adopt aforementioned statistics create detailed...
Automatic Identification System (AIS) is the de-facto communication standard used by vessels to broadcast identification and position information. However, being AIS communications neither encrypted nor authenticated, they can be eavesdropped spoofed adversaries, leading potentially threatening scenarios. Existing solutions, including ones conceived in avionics domain, do not consider integration with standard, provide protection against rogue messages flooding. In this article, we propose...
The increasing popularity of autonomous and remotely-piloted drones has paved the way for several use-cases application scenarios, including merchandise delivery, surveillance, warfare, to cite a few. In many estimating with zero-touch weight payload carried by drone before it approaches could be particular interest, e.g., provide early tampering detection when is sensitively different from expected one. To best our knowledge, we are first investigate possibility remotely detect commercial...
Current collision avoidance techniques deployed on Unmanned Aerial Vehicles (UAVs) rely short-range sensors, such as proximity cameras, and microphones. Unfortunately, their efficiency is significantly limited in several situations; for instance, when a remote UAV approaches at high velocity, or the surrounding environment impaired (e.g., fog, noise). In cited cases, to avoid collisions maintain self-separation, UAVs often indiscriminate broadcast of location. Therefore, an adversary could...
We propose Strength of Crowd (SoC), a distributed Internet Things (IoT) protocol that guarantees message broadcast from an initiator to all network nodes in the presence either reactive or proactive jammer, targets variable portion radio spectrum. SoC exploits simple, yet innovative and effective idea: not (currently) involved process transmit decoy messages cannot be distinguished (by jammer) real ones. Therefore, jammer has implement best-effort strategy jam concurrent communications up...