- UAV Applications and Optimization
- Cryptography and Data Security
- Security in Wireless Sensor Networks
- Privacy-Preserving Technologies in Data
- Vehicular Ad Hoc Networks (VANETs)
- IoT and Edge/Fog Computing
- Blockchain Technology Applications and Security
- Network Security and Intrusion Detection
- COVID-19 Digital Contact Tracing
- Internet Traffic Analysis and Secure E-voting
- Cryptographic Implementations and Security
- IoT Networks and Protocols
- Indoor and Outdoor Localization Technologies
- Advanced Authentication Protocols Security
- Underwater Vehicles and Communication Systems
- Privacy, Security, and Data Protection
- Water Quality Monitoring Technologies
- Maritime Navigation and Safety
- Distributed Control Multi-Agent Systems
- User Authentication and Security Systems
- Satellite Communication Systems
- Space Satellite Systems and Control
- Energy Harvesting in Wireless Networks
- Energy Efficient Wireless Sensor Networks
- Air Quality Monitoring and Forecasting
Technology Innovation Institute
2022-2024
Eindhoven University of Technology
2024
Hamad bin Khalifa University
2018-2023
Robotics Research (United States)
2023
Singapore Institute of Technology
2022
Consorzio Nazionale Interuniversitario per le Telecomunicazioni
2018-2019
Qatar Science and Technology Park
2019
Polytechnic University of Bari
2018
Satellite-based Communication (SATCOM) systems are gaining renewed momentum in Industry and Academia, thanks to innovative services introduced by leading tech companies the promising impact they can deliver towards global connectivity objective tackled early 6G initiatives. On one hand, emergence of new manufacturing processes radio technologies promises reduce service costs while guaranteeing outstanding communication latency, available bandwidth, flexibility, coverage range. other...
Vessels cybersecurity is recently gaining momentum, as a result of few recent attacks to vessels at sea.These have shacked the maritime domain, which was thought be relatively immune cyber threats.The cited belief now over, proved by mandates issued International Maritime Organization (IMO).According these regulations, all should subject risk analysis, and technical controls adopted mitigate resulting risks.This initiative laudable since, despite incidents, vulnerabilities threats affecting...
Certificateless public-key cryptography (CL-PKC) schemes are particularly robust against the leakage of secret information stored on a trusted third party (TTP). These security features relevant for Internet Things (IoT) domains, where devices typically preconfigured with keys, usually locally TTP following maintenance tasks. Despite some contributions already proposed adoption CL-PKC in constrained IoT devices, current solutions generally require high message overhead, computationally...
The recent advancements in hardware miniaturization capabilities have boosted the diffusion of systems based on Energy Harvesting (EH) technologies, as a means to power embedded wireless devices sustainable and low-cost fashion. Despite undeniable management advantages, intermittent availability energy source limited supply has led challenging system trade-offs, resulting an increased attack surface general relaxation available security services. In this paper, we survey issues,...
The Federal Aviation Administration (FAA) recently introduced a new standard, namely, remote identification, to improve accountability for unmanned aerial vehicles (UAVs) operations. This rule requires UAV operators broadcast messages revealing sensitive data, such as identity and location on the wireless channel. However, this leads security privacy concerns among operators. Unauthorized parties may easily discover of flying in specific area launch attacks it using jamming or tracking its...
Contact tracing promises to help fight the spread of Covid-19 via an early detection possible contagion events. To this end, most existing solutions share following architecture: smartphones continuously broadcast random beacons that are intercepted by nearby devices and stored into their local contact logs. In paper, we propose IoT-enabled architecture for relaxes smartphone-centric assumption, provide a solution enjoys features: (i) it reduces overhead on end-user bare minimum -- mobile...
Safety and security issues for Critical Infrastructures are growing as attackers adopt drones an attack vector flying in sensitive airspaces, such airports, military bases, city centers, crowded places. Despite the use of UAVs logistics, shipping recreation activities, commercial applications, their usage poses severe concerns to operators due violations invasions restricted airspaces. A cost-effective real-time framework is needed detect presence cases. In this contribution, we propose...
The recent worldwide introduction of RemoteID (RID) regulations forces all Unmanned Aircrafts (UAs), a.k.a. drones, to broadcast in plaintext on the wireless channel their identity and real-time location, for accounting monitoring purposes. Although improving drones' situational awareness, RID rule also generates significant privacy concerns UAs' operators, threatened by ease tracking UAs related confidentiality connected with broadcasting information. In this paper, we propose $A^2RID$, a...
The increasing integration of information and communication technologies has undoubtedly boosted the efficiency Critical Infrastructures (CI). However, first wave IoT devices, together with management enormous amount data generated by modern CIs, created serious architectural issues. While emerging Fog Multi-Access Edge Computing (FMEC) paradigms can provide a viable solution, they also bring inherent security issues, that cause dire consequences in context CIs. In this paper, we analyze...
The Internet of Things (IoT) represents the enabling paradigm a huge number smart applications, spanning from short‐range communications to Low‐Power Wide‐Area Network (LPWAN). Among them, environmental monitoring becomes more and challenging as area interest is difficult reach. present contribution proposes WaterS, an open‐source project that relies on low‐cost rapid‐prototyping technologies. It tackles main challenges remote water quality systems taking advantage Sigfox protocol stack....
We propose JAM-ME, an autonomous jamming-assisted navigation system that allows a drone to accomplish its mission even in the presence of anti-drone jamming protection system. In this contribution, we review current state-of-the-art highlighting how solutions respond drones are completely ineffective against JAM-ME. particular, introduce our solution and theoretical framework, later relax few constraints baseline model (adding wind drift, allowing target be randomly placed within jammed...
Automatic Identification System (AIS) is the de-facto communication standard used by vessels to broadcast identification and position information. However, being AIS communications neither encrypted nor authenticated, they can be eavesdropped spoofed adversaries, leading potentially threatening scenarios. Existing solutions, including ones conceived in avionics domain, do not consider integration with standard, provide protection against rogue messages flooding. In this article, we propose...
Current collision avoidance techniques deployed on Unmanned Aerial Vehicles (UAVs) rely short-range sensors, such as proximity cameras, and microphones. Unfortunately, their efficiency is significantly limited in several situations; for instance, when a remote UAV approaches at high velocity, or the surrounding environment impaired (e.g., fog, noise). In cited cases, to avoid collisions maintain self-separation, UAVs often indiscriminate broadcast of location. Therefore, an adversary could...
Modern vessels increasingly rely on the Automatic Identification System (AIS) digital technology to wirelessly broadcast identification and position information neighboring ports. AIS is a time-slotted protocol that also provides unicast messages-usually employed manage self-separation exchange safety information. However, does not provide any security feature. The messages are exchanged in clear-text, they authenticated, being vulnerable several attacks, including forging replay. Despite...
To enable enhanced accountability of Unmanned Aerial Vehicles (UAVs) operations, the US-based Federal Avionics Administration (FAA) recently published a new dedicated regulation, namely RemoteID, requiring UAV operators to broadcast messages reporting their identity and location. The enforcement such rule, mandatory by 2022, generated significant concerns on operators, primarily because privacy issues derived indiscriminate plain-text wireless channel.
Over the last years, several works introduced network-based intrusion detection schemes based on machine learning techniques for securing IoT devices. Despite promising results, proposed approaches are rarely adopted in production environments. Networked environments exhibit highly unpredictable behavior, unlike other areas where has been effectively adopted. Unfortunately, changing behavior during time may lead to higher classification errors than those measured test phase. In this study,...
In this paper, we show, for the first time in literature, that common assumption jamming is an effective way to neutralise drones, false. particular, propose JAM-ME a solution allows drone exploit adversarial signal implement emergency but yet navigation system, enabling accomplish its mission. Our contributions are manifold: first, revise based anti-drone techniques; second, introduce basic model and accompanying mathematical tool-rooted systems control theory. Further, show through...
Contact tracing is the techno-choice of reference to address COVID-19 pandemic. Many current approaches have severe privacy and security issues fail offer a sustainable contact infrastructure. We these introducing an innovative, privacy-preserving, sustainable, experimentally tested architecture that leverages batteryless BLE beacons.
Remote Identification (RID) regulations recently promulgated worldwide are forcing commercial drones to broadcast wirelessly the location of pilot in plaintext. However, many real-world use cases, plaintext availability such information leads privacy issues, allowing extraction sensitive about and confidential details drone's business. To address this issue, paper proposes SNELL, a RID-compliant solution for selective authenticated disclosure. Using drone can disclose RID messages providing...
Blockchain is emerging as a promising technology that able to support transparent, secure, and immutable transactions traceability in decentralized networks. Its usage many application domains, including the Internet of Things, gaining attention even more researchers industries worldwide. In line with current research interests, work presented this letter has been carried out context European H2020 symbIoTe project. Among its main features, framework offers bartering functionalities across...
Traditional studies on jamming effectiveness and propagation over the wireless channel assume ideal theoretical models, such as Friis Rician. However, cited models have been hardly validated by on-field assessments in real scenarios. To best of our knowledge, we are first ones to fill highlighted gap. In particular, objective is provide a realistic model, taking into account heterogeneous operating frequencies technologies. Our findings, supported an extensive experimental campaign outdoor...