Pietro Tedeschi

ORCID: 0000-0003-3324-3706
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • UAV Applications and Optimization
  • Cryptography and Data Security
  • Security in Wireless Sensor Networks
  • Privacy-Preserving Technologies in Data
  • Vehicular Ad Hoc Networks (VANETs)
  • IoT and Edge/Fog Computing
  • Blockchain Technology Applications and Security
  • Network Security and Intrusion Detection
  • COVID-19 Digital Contact Tracing
  • Internet Traffic Analysis and Secure E-voting
  • Cryptographic Implementations and Security
  • IoT Networks and Protocols
  • Indoor and Outdoor Localization Technologies
  • Advanced Authentication Protocols Security
  • Underwater Vehicles and Communication Systems
  • Privacy, Security, and Data Protection
  • Water Quality Monitoring Technologies
  • Maritime Navigation and Safety
  • Distributed Control Multi-Agent Systems
  • User Authentication and Security Systems
  • Satellite Communication Systems
  • Space Satellite Systems and Control
  • Energy Harvesting in Wireless Networks
  • Energy Efficient Wireless Sensor Networks
  • Air Quality Monitoring and Forecasting

Technology Innovation Institute
2022-2024

Eindhoven University of Technology
2024

Hamad bin Khalifa University
2018-2023

Robotics Research (United States)
2023

Singapore Institute of Technology
2022

Consorzio Nazionale Interuniversitario per le Telecomunicazioni
2018-2019

Qatar Science and Technology Park
2019

Polytechnic University of Bari
2018

Satellite-based Communication (SATCOM) systems are gaining renewed momentum in Industry and Academia, thanks to innovative services introduced by leading tech companies the promising impact they can deliver towards global connectivity objective tackled early 6G initiatives. On one hand, emergence of new manufacturing processes radio technologies promises reduce service costs while guaranteeing outstanding communication latency, available bandwidth, flexibility, coverage range. other...

10.1016/j.comnet.2022.109246 article EN cc-by Computer Networks 2022-08-03

Vessels cybersecurity is recently gaining momentum, as a result of few recent attacks to vessels at sea.These have shacked the maritime domain, which was thought be relatively immune cyber threats.The cited belief now over, proved by mandates issued International Maritime Organization (IMO).According these regulations, all should subject risk analysis, and technical controls adopted mitigate resulting risks.This initiative laudable since, despite incidents, vulnerabilities threats affecting...

10.1109/mcom.001.1900632 article EN IEEE Communications Magazine 2020-06-01

Certificateless public-key cryptography (CL-PKC) schemes are particularly robust against the leakage of secret information stored on a trusted third party (TTP). These security features relevant for Internet Things (IoT) domains, where devices typically preconfigured with keys, usually locally TTP following maintenance tasks. Despite some contributions already proposed adoption CL-PKC in constrained IoT devices, current solutions generally require high message overhead, computationally...

10.1109/jiot.2019.2953549 article EN IEEE Internet of Things Journal 2019-11-15

The recent advancements in hardware miniaturization capabilities have boosted the diffusion of systems based on Energy Harvesting (EH) technologies, as a means to power embedded wireless devices sustainable and low-cost fashion. Despite undeniable management advantages, intermittent availability energy source limited supply has led challenging system trade-offs, resulting an increased attack surface general relaxation available security services. In this paper, we survey issues,...

10.1109/comst.2020.3017665 article EN IEEE Communications Surveys & Tutorials 2020-01-01

The Federal Aviation Administration (FAA) recently introduced a new standard, namely, remote identification, to improve accountability for unmanned aerial vehicles (UAVs) operations. This rule requires UAV operators broadcast messages revealing sensitive data, such as identity and location on the wireless channel. However, this leads security privacy concerns among operators. Unauthorized parties may easily discover of flying in specific area launch attacks it using jamming or tracking its...

10.1109/tii.2023.3280325 article EN cc-by-nc-nd IEEE Transactions on Industrial Informatics 2023-06-05

Contact tracing promises to help fight the spread of Covid-19 via an early detection possible contagion events. To this end, most existing solutions share following architecture: smartphones continuously broadcast random beacons that are intercepted by nearby devices and stored into their local contact logs. In paper, we propose IoT-enabled architecture for relaxes smartphone-centric assumption, provide a solution enjoys features: (i) it reduces overhead on end-user bare minimum -- mobile...

10.1109/mcom.001.2000729 article EN IEEE Communications Magazine 2021-06-01

Safety and security issues for Critical Infrastructures are growing as attackers adopt drones an attack vector flying in sensitive airspaces, such airports, military bases, city centers, crowded places. Despite the use of UAVs logistics, shipping recreation activities, commercial applications, their usage poses severe concerns to operators due violations invasions restricted airspaces. A cost-effective real-time framework is needed detect presence cases. In this contribution, we propose...

10.1109/ojvt.2023.3333676 article EN cc-by IEEE Open Journal of Vehicular Technology 2023-01-01

The recent worldwide introduction of RemoteID (RID) regulations forces all Unmanned Aircrafts (UAs), a.k.a. drones, to broadcast in plaintext on the wireless channel their identity and real-time location, for accounting monitoring purposes. Although improving drones' situational awareness, RID rule also generates significant privacy concerns UAs' operators, threatened by ease tracking UAs related confidentiality connected with broadcasting information. In this paper, we propose $A^2RID$, a...

10.1109/jiot.2023.3240477 article EN IEEE Internet of Things Journal 2023-01-30

The increasing integration of information and communication technologies has undoubtedly boosted the efficiency Critical Infrastructures (CI). However, first wave IoT devices, together with management enormous amount data generated by modern CIs, created serious architectural issues. While emerging Fog Multi-Access Edge Computing (FMEC) paradigms can provide a viable solution, they also bring inherent security issues, that cause dire consequences in context CIs. In this paper, we analyze...

10.1109/eurospw.2019.00007 article EN 2019-06-01

The Internet of Things (IoT) represents the enabling paradigm a huge number smart applications, spanning from short‐range communications to Low‐Power Wide‐Area Network (LPWAN). Among them, environmental monitoring becomes more and challenging as area interest is difficult reach. present contribution proposes WaterS, an open‐source project that relies on low‐cost rapid‐prototyping technologies. It tackles main challenges remote water quality systems taking advantage Sigfox protocol stack....

10.1002/itl2.74 article EN Internet Technology Letters 2018-09-20

We propose JAM-ME, an autonomous jamming-assisted navigation system that allows a drone to accomplish its mission even in the presence of anti-drone jamming protection system. In this contribution, we review current state-of-the-art highlighting how solutions respond drones are completely ineffective against JAM-ME. particular, introduce our solution and theoretical framework, later relax few constraints baseline model (adding wind drift, allowing target be randomly placed within jammed...

10.1109/access.2019.2963105 article EN cc-by IEEE Access 2019-12-30

Automatic Identification System (AIS) is the de-facto communication standard used by vessels to broadcast identification and position information. However, being AIS communications neither encrypted nor authenticated, they can be eavesdropped spoofed adversaries, leading potentially threatening scenarios. Existing solutions, including ones conceived in avionics domain, do not consider integration with standard, provide protection against rogue messages flooding. In this article, we propose...

10.1109/tdsc.2021.3069428 article EN IEEE Transactions on Dependable and Secure Computing 2021-03-30

Current collision avoidance techniques deployed on Unmanned Aerial Vehicles (UAVs) rely short-range sensors, such as proximity cameras, and microphones. Unfortunately, their efficiency is significantly limited in several situations; for instance, when a remote UAV approaches at high velocity, or the surrounding environment impaired (e.g., fog, noise). In cited cases, to avoid collisions maintain self-separation, UAVs often indiscriminate broadcast of location. Therefore, an adversary could...

10.1109/tdsc.2022.3159837 article EN IEEE Transactions on Dependable and Secure Computing 2022-03-16

Modern vessels increasingly rely on the Automatic Identification System (AIS) digital technology to wirelessly broadcast identification and position information neighboring ports. AIS is a time-slotted protocol that also provides unicast messages-usually employed manage self-separation exchange safety information. However, does not provide any security feature. The messages are exchanged in clear-text, they authenticated, being vulnerable several attacks, including forging replay. Despite...

10.1109/cns48642.2020.9162320 article EN 2020-06-01

To enable enhanced accountability of Unmanned Aerial Vehicles (UAVs) operations, the US-based Federal Avionics Administration (FAA) recently published a new dedicated regulation, namely RemoteID, requiring UAV operators to broadcast messages reporting their identity and location. The enforcement such rule, mandatory by 2022, generated significant concerns on operators, primarily because privacy issues derived indiscriminate plain-text wireless channel.

10.1145/3485832.3485834 article EN Annual Computer Security Applications Conference 2021-12-06

Over the last years, several works introduced network-based intrusion detection schemes based on machine learning techniques for securing IoT devices. Despite promising results, proposed approaches are rarely adopted in production environments. Networked environments exhibit highly unpredictable behavior, unlike other areas where has been effectively adopted. Unfortunately, changing behavior during time may lead to higher classification errors than those measured test phase. In this study,...

10.1109/iotm.001.2300106 article EN IEEE Internet of Things Magazine 2023-06-01

In this paper, we show, for the first time in literature, that common assumption jamming is an effective way to neutralise drones, false. particular, propose JAM-ME a solution allows drone exploit adversarial signal implement emergency but yet navigation system, enabling accomplish its mission. Our contributions are manifold: first, revise based anti-drone techniques; second, introduce basic model and accompanying mathematical tool-rooted systems control theory. Further, show through...

10.1109/cns.2019.8802717 article EN 2019-06-01

Contact tracing is the techno-choice of reference to address COVID-19 pandemic. Many current approaches have severe privacy and security issues fail offer a sustainable contact infrastructure. We these introducing an innovative, privacy-preserving, sustainable, experimentally tested architecture that leverages batteryless BLE beacons.

10.1109/msec.2021.3115497 article EN IEEE Security & Privacy 2021-10-20

Remote Identification (RID) regulations recently promulgated worldwide are forcing commercial drones to broadcast wirelessly the location of pilot in plaintext. However, many real-world use cases, plaintext availability such information leads privacy issues, allowing extraction sensitive about and confidential details drone's business. To address this issue, paper proposes SNELL, a RID-compliant solution for selective authenticated disclosure. Using drone can disclose RID messages providing...

10.56553/popets-2024-0091 article EN Proceedings on Privacy Enhancing Technologies 2024-06-25

Blockchain is emerging as a promising technology that able to support transparent, secure, and immutable transactions traceability in decentralized networks. Its usage many application domains, including the Internet of Things, gaining attention even more researchers industries worldwide. In line with current research interests, work presented this letter has been carried out context European H2020 symbIoTe project. Among its main features, framework offers bartering functionalities across...

10.1002/itl2.72 article EN Internet Technology Letters 2018-08-18

Traditional studies on jamming effectiveness and propagation over the wireless channel assume ideal theoretical models, such as Friis Rician. However, cited models have been hardly validated by on-field assessments in real scenarios. To best of our knowledge, we are first ones to fill highlighted gap. In particular, objective is provide a realistic model, taking into account heterogeneous operating frequencies technologies. Our findings, supported an extensive experimental campaign outdoor...

10.1109/ispa-bdcloud-socialcom-sustaincom52081.2021.00210 article EN 2021-09-01
Coming Soon ...