Search Results - "Tedeschi, Pietro"
-
1
Localization of a Power-Modulated Jammer
Published in Sensors (Basel, Switzerland) (01-01-2022)“…Jamming is a malicious radio activity that represents a dreadful threat when employed in critical scenarios. Several techniques have been proposed to detect,…”
Get full text
Journal Article -
2
LiKe: Lightweight Certificateless Key Agreement for Secure IoT Communications
Published in IEEE internet of things journal (01-01-2020)“…Certificateless public-key cryptography (CL-PKC) schemes are particularly robust against the leakage of secret information stored on a trusted third party…”
Get full text
Journal Article -
3
Leveraging Jamming to Help Drones Complete Their Mission
Published in IEEE access (2020)“…We propose JAM-ME, an autonomous jamming-assisted navigation system that allows a drone to accomplish its mission even in the presence of an anti-drone jamming…”
Get full text
Journal Article -
4
URANUS: Radio Frequency Tracking, Classification and Identification of Unmanned Aircraft Vehicles
Published in IEEE open journal of vehicular technology (2023)“…Safety and security issues for Critical Infrastructures are growing as attackers adopt drones as an attack vector flying in sensitive airspaces, such as…”
Get full text
Journal Article -
5
Satellite-based communications security: A survey of threats, solutions, and research challenges
Published in Computer networks (Amsterdam, Netherlands : 1999) (24-10-2022)“…Satellite-based Communication (SATCOM) systems are gaining renewed momentum in Industry and Academia, thanks to innovative services introduced by leading tech…”
Get full text
Journal Article -
6
Security in Energy Harvesting Networks: A Survey of Current Solutions and Research Challenges
Published in IEEE Communications surveys and tutorials (01-01-2020)“…The recent advancements in hardware miniaturization capabilities have boosted the diffusion of systems based on Energy Harvesting (EH) technologies, as a means…”
Get full text
Journal Article -
7
Future scenarios for the infrastructure digitalization: The road ahead
Published in Frontiers in the internet of things (14-03-2023)“…Nowadays, every industry across the globe is facing a disruptive transformation enabled by digitalization processes. Also, the industry of infrastructures,…”
Get full text
Journal Article -
8
PPCA - Privacy-Preserving Collision Avoidance for Autonomous Unmanned Aerial Vehicles
Published in IEEE transactions on dependable and secure computing (01-03-2023)“…Current collision avoidance techniques deployed on Unmanned Aerial Vehicles (UAVs) rely on short-range sensors, such as proximity sensors, cameras, and…”
Get full text
Journal Article -
9
Federated learning for reliable model updates in network-based intrusion detection
Published in Computers & security (01-10-2023)Get full text
Journal Article -
10
Detection of quality of service degradation on multi-tenant containerized services
Published in Journal of network and computer applications (01-04-2024)“…Computational services are progressively migrating to container-based solutions due to their faster provision time and lower resource allocation overhead…”
Get full text
Journal Article -
11
Privacy-Aware Remote Identification for Unmanned Aerial Vehicles: Current Solutions, Potential Threats, and Future Directions
Published in IEEE transactions on industrial informatics (01-02-2024)“…The Federal Aviation Administration (FAA) recently introduced a new standard, namely, remote identification , to improve accountability for unmanned aerial…”
Get full text
Journal Article -
12
Auth-AIS: Secure, Flexible, and Backward-Compatible Authentication of Vessels AIS Broadcasts
Published in IEEE transactions on dependable and secure computing (01-07-2022)“…Automatic Identification System (AIS) is the de-facto communication standard used by vessels to broadcast identification and position information. However,…”
Get full text
Journal Article -
13
Water quality prediction on a Sigfox-compliant IoT device: The road ahead of WaterS
Published in Ad hoc networks (01-03-2022)“…Water pollution is a critical issue that affects the entire ecosystem, with non-negligible consequences on humans’ health, thus inducing economic and social…”
Get full text
Journal Article -
14
SpreadMeNot: A Provably Secure and Privacy-Preserving Contact Tracing Protocol
Published in IEEE transactions on dependable and secure computing (01-05-2023)“…A plethora of contact tracing apps have been developed and deployed in several countries around the world in the battle against Covid-19 . However, people are…”
Get full text
Journal Article -
15
Security and Privacy Issues in Internet of Skies: Advanced Solutions for Drones and UAVs for Critical Infrastructures Protection
Published 01-01-2021“…Unmanned Aerial Vehicles (UAVs) are widely considered the next breakthrough in the ongoing Industry 4.0 revolution, thanks to their high mobility, on-demand…”
Get full text
Dissertation -
16
A2RID -Anonymous Direct Authentication and Remote Identification of Commercial Drones
Published in IEEE internet of things journal (27-01-2023)“…The recent worldwide introduction of RemoteID (RID) regulations forces all Unmanned Aircrafts (UAs), a.k.a. drones, to broadcast in plaintext on the wireless…”
Get full text
Journal Article -
17
A 2 RID —Anonymous Direct Authentication and Remote Identification of Commercial Drones
Published in IEEE internet of things journal (15-06-2023)“…The recent worldwide introduction of RemoteID (RID) regulations forces all unmanned aircrafts (UAs), also known as drones, to broadcast in plaintext on the…”
Get full text
Journal Article -
18
WaterS: A Sigfox‐compliant prototype for water monitoring
Published in Internet technology letters (01-01-2019)“…The Internet of Things (IoT) represents the enabling paradigm of a huge number of smart applications, spanning from short‐range communications to Low‐Power…”
Get full text
Journal Article -
19
Edge and Fog Computing in Critical Infrastructures: Analysis, Security Threats, and Research Challenges
Published in 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (01-06-2019)“…The increasing integration of information and communication technologies has undoubtedly boosted the efficiency of Critical Infrastructures (CI). However, the…”
Get full text
Conference Proceeding -
20
Blockchain as a service: Securing bartering functionalities in the H2020 symbIoTe framework
Published in Internet technology letters (01-01-2019)“…Blockchain is emerging as a promising technology that is able to support transparent, secure, and immutable transactions traceability in decentralized…”
Get full text
Journal Article