- IPv6, Mobility, Handover, Networks, Security
- Caching and Content Delivery
- Peer-to-Peer Network Technologies
- Software-Defined Networks and 5G
- Network Traffic and Congestion Control
- IoT and Edge/Fog Computing
- Mobile Agent-Based Network Management
- Internet Traffic Analysis and Secure E-voting
- Wireless Networks and Protocols
- Network Security and Intrusion Detection
- Advanced Optical Network Technologies
- Cryptography and Data Security
- Advanced Authentication Protocols Security
- Access Control and Trust
- Interconnection Networks and Systems
- Advanced Data Storage Technologies
- Power Line Communications and Noise
- Blockchain Technology Applications and Security
- Cloud Computing and Resource Management
- Energy Efficient Wireless Sensor Networks
- Opportunistic and Delay-Tolerant Networks
- Wireless Communication Networks Research
- Security in Wireless Sensor Networks
- Advanced Malware Detection Techniques
- Anomaly Detection Techniques and Applications
University of Parma
2014-2023
CoRiTeL
2002-2003
Sapienza University of Rome
2002-2003
Consortium for Research in Automatic and Telecommunications
2002
In this paper, we propose IoTChain, a combination of the OSCAR architecture [1] and ACE authorization framework [2] to provide an E2E solution for secure authorized access IoT resources. IoTChain consists two components, blockchain based on object security model, extended with group key scheme. The provides flexible trustless way handle while uses public ledger set up multicast groups clients. To evaluate feasibility our architecture, have implemented top private Ethereum network. We report...
Open authorization (OAuth) is an open protocol, which allows secure in a simple and standardized way from third-party applications accessing online services, based on the representational state transfer (REST) web architecture. OAuth has been designed to provide layer, typically top of transport layer such as HTTPS. The Internet Things (IoTs) refers interconnection billions resource-constrained devices, denoted smart objects, Internet-like structure. Smart objects have limited...
The Internet of Things (IoT) aims at connecting billions devices in an Internet-like structure. This gigantic information exchange enables new opportunities and forms interactions among things people. A crucial enabler robust applications easy smart objects' deployment is the availability mechanisms that minimize (ideally, cancel) need for external human intervention configuration maintenance deployed objects. These must also be scalable, since number objects expected to constantly grow next...
Session Initiation Protocol (SIP) is currently receiving much attention and seems to be the most promising candidate as a signaling protocol for current future IP telephony services, also becoming real competitor plain old telephone service. For realization of such scenario, there an obvious need provide certain level quality security, comparable that provided by traditional systems. While problem QoS mostly refers network layer, security strictly related mechanisms service provisioning...
The Internet of Things (IoT) refers to the Internet-like structure billions interconnected constrained devices, denoted as “smart objects”. Smart objects have limited capabilities, in terms computational power and memory, might be battery-powered thus raising need adopt particularly energy efficient technologies. Among most notable challenges that building smart brings about, there are standardization interoperability. use IP has been foreseen standard for interoperability objects. As...
The Information-Centric Networking (ICN) paradigm is expected to be one of the major innovation Future Internet An ICN can characterized by some key components like: (i) content-centric request/reply for data distribution, (ii) route-by-name operations, and (iii) in-network caching. In this paper we focus on a framework called CONET (COntent NETwork) in particular solution devised under coCONET. coCONET characteristics make it suitable deployment accordance Software Defined Networks (SDN)...
This paper presents an architecture to support Vir- tual Network Functions (VNFs) chaining using the IPv6 Segment Routing (SR) network programming model. Two classes of VNFs are considered: SR-aware and SR-unaware. The operations both SR-unaware described at architectural level we propose a solution for hosted in NFV node. An Open Source implementation proposed Linux based host is available set performance measurements have been carried out testbed.
Traffic Engineering (TE) in IP carrier networks is one of the functions that can benefit from Software Defined Networking paradigm. However traditional per-flow routing requires a direct interaction between SDN controller and each node involved traffic paths. Segment Routing (SR) may simplify route enforcement delegating all configuration state at border network. In this work we propose an architecture integrates paradigm with SR based TE, for which have provided open source reference...
In the emerging industrial Internet of Things (IIoT) scenario, machine-to-machine communication is a key technology to set up environments, wherein sensors, actuators, and controllers can exchange information autonomously. However, many current frameworks do not provide enough dynamic interoperability security. Hence, in this article, we propose novel framework based on Message Queuing Telemetry Transport (MQTT) broker bridging, which, an IIoT foster across different production lines or...
The COPS protocol has been designed to enable communication on the interface between policy decision administrator and enforcement devices in a policy-based networking environment. It can be recognized that same there is need transfer information related request of resource by QoS clients for allocation resources servers (e.g., bandwidth broker) DiffServ network. Hence, it sensible add this functionality framework. In particular, are at least two cases where use COPS. first case an edge node...
The ITU-T definition of next generation networks includes the ability to make use multiple broadband transport technologies and support generalized mobility. Next must integrate several IP-based access in a seamless way. In this article, we first describe requirements mobility management scheme for multimedia real-time communication services; then, report survey schemes proposed recent literature perform vertical handovers between heterogeneous networks. Based on analysis, propose an...
Security in the Internet of Things is a current and important research topic as it may encompass different aspects such confidentiality integrity personal data, well authentication authorization to access smart devices sensors that are spreading day-by-day our lives. In this paper we focus onto MQTT (Message Queue Telemetry Transport), message-based communication protocol explicitly designed for low-power based upon publish-subscribe paradigm. First all, describe some security solutions...
Internet traffic detection and classification has been thoroughly studied in the last decade, but this is still a hot topic as regards of Things (IoT), communication paradigm that going to involve different aspects our daily life. As consequence, researchers started applying traditional methods for also flows coming addressed smart devices. In paper, we created large integrated dataset IoT flows, from four network scenarios, order have benchmark future research. Moreover, used test...
Anomaly detection in network traffic is a hot and ongoing research theme especially when concerning IoT devices, which are quickly spreading throughout various situations of people’s life and, at the same time, prone to be attacked through different weak points. In this paper, we tackle emerging anomaly problem IoT, by integrating five datasets abnormal evaluating them with deep learning approach capable identifying both normal malicious as well types anomalies. The large integrated dataset...
The Internet of Things (IoT) is continuously growing interest for research and industry [...]
The Internet of Things (IoT) will interconnect billions devices (denoted as "Smart Objects," SOs) in an IP-based Internet-like structure. SOs are typically sensor/actuator-equipped with severe constraints on processing capabilities, available RAM/ROM, and energy consumption. In a context where deployed SOs, it is important that the able to self-configure adapt surrounding environment minimal, if any, external human intervention. Among service discovery mechanisms proposed literature for...
Security in the Internet of Things is a current hot topic and it may comprise different aspects such as confidentiality integrity personal data, well authentication authorization to access smart objects that are spreading more our every-day lives. In this work we focus on MQTT (Message Queue Telemetry Transport), message-based communication protocol explicitly designed for low-power machine-to-machine communications based publish-subscribe paradigm. First all, provide an accurate analysis...
Abstract In the context of Internet Things (IoT), particularly within medical facilities, detection and categorization traffic remain significant challenges. While conventional methods for IoT analysis can be applied, obtaining suitable data is challenging due to stringent privacy constraints associated with health domain. To address this, this study proposes a network simulation approach using an open-source tool called Flock, which supports both CoAP MQTT protocols. The used create...