AB

Alessandro Brighente

Authored

20 records found

Threat Sensitive Networking

On the Security of IEEE 802.1CB and (un)Effectiveness of Existing Security Solutions

IEEE 802.1CB provides a standard for reliable packet delivery within Time-Sensitive Networking (TSN). As this standard is envisioned to be used in mission-critical networks in the near future, it has to be protected against security threats. The integrity of the network communica ...

BARON

Base-Station Authentication Through Core Network for Mobility Management in 5G Networks

Fifth-generation (5G) cellular communication networks are being deployed on applications beyond mobile devices, including vehicular networks and industry automation. Despite their increasing popularity, 5G networks, as defined by the Third Generation Partnership Project (3GPP), h ...

SETCAP

Service-Based Energy-Efficient Temporal Credential Authentication Protocol for Internet of Drones

Internet of Drones (IoD) is a framework to set up drones networks that may serve multiple purposes, e.g., data collection. New IoD applications (such as drone assisted internet of vehicles) envision the simultaneous collection of multiple data types. Although authentication may p ...
The Fifth Generation of Communication Networks (5G) envisions a broader range of services compared to previous generations, supporting an increased number of use cases and applications. The broader application domain leads to increase in consumer use and, in turn, increased hacke ...
The Fifth Generation of Communication Networks (5G) envisions a broader range of services compared to previous generations, supporting an increased number of use cases and applications. The broader application domain leads to increase in consumer use and, in turn, increased hacke ...

FOLPETTI

A Novel Multi-Armed Bandit Smart Attack for Wireless Networks

Channel hopping provides a defense mechanism against jamming attacks in large scale Internet of Things (IoT) networks. However, a sufficiently powerful attacker may be able to learn the channel hopping pattern and efficiently predict the channel to jam. In this paper, we present ...

FOLPETTI

A Novel Multi-Armed Bandit Smart Attack for Wireless Networks

Channel hopping provides a defense mechanism against jamming attacks in large scale Internet of Things (IoT) networks. However, a sufficiently powerful attacker may be able to learn the channel hopping pattern and efficiently predict the channel to jam. In this paper, we present ...

Hide and Seek

Privacy-Preserving and FAA-compliant Drones Location Tracing

Due to the frequent unauthorized invasions by commercial drones to Critical Infrastructures (CIs), the US-based Federal Avionics Administration (FAA) recently published a new specification, namely RemoteID. Such a rule requires all drones to broadcast information about their iden ...

An IoT Inventory Before Deployment

A Survey on IoT Protocols, Communication Technologies, Vulnerabilities, Attacks, and Future Research Directions

The Internet of Things (IoT) is a pervasive phenomenon in our everyday life, binding and enabling communication between heterogeneous physical devices and the internet. The applications of this technology range from industrial control to medical devices, hence interconnecting a h ...

An IoT Inventory Before Deployment

A Survey on IoT Protocols, Communication Technologies, Vulnerabilities, Attacks, and Future Research Directions

The Internet of Things (IoT) is a pervasive phenomenon in our everyday life, binding and enabling communication between heterogeneous physical devices and the internet. The applications of this technology range from industrial control to medical devices, hence interconnecting a h ...

An IoT Inventory Before Deployment

A Survey on IoT Protocols, Communication Technologies, Vulnerabilities, Attacks, and Future Research Directions

The Internet of Things (IoT) is a pervasive phenomenon in our everyday life, binding and enabling communication between heterogeneous physical devices and the internet. The applications of this technology range from industrial control to medical devices, hence interconnecting a h ...

An IoT Inventory Before Deployment

A Survey on IoT Protocols, Communication Technologies, Vulnerabilities, Attacks, and Future Research Directions

The Internet of Things (IoT) is a pervasive phenomenon in our everyday life, binding and enabling communication between heterogeneous physical devices and the internet. The applications of this technology range from industrial control to medical devices, hence interconnecting a h ...

An IoT Inventory Before Deployment

A Survey on IoT Protocols, Communication Technologies, Vulnerabilities, Attacks, and Future Research Directions

The Internet of Things (IoT) is a pervasive phenomenon in our everyday life, binding and enabling communication between heterogeneous physical devices and the internet. The applications of this technology range from industrial control to medical devices, hence interconnecting a h ...

Tell Me How You Re-Charge, I Will Tell You Where You Drove To

Electric Vehicles Profiling Based on Charging-Current Demand

Charging an EV (Electric Vehicle) comprises two phases: a) resource negotiation, and b) actual charging. While the former phase runs over secure communication protocols, the latter is usually assumed not to be a threat to security and privacy. However, we believe that the physica ...

Tell Me How You Re-Charge, I Will Tell You Where You Drove To

Electric Vehicles Profiling Based on Charging-Current Demand

Charging an EV (Electric Vehicle) comprises two phases: a) resource negotiation, and b) actual charging. While the former phase runs over secure communication protocols, the latter is usually assumed not to be a threat to security and privacy. However, we believe that the physica ...

Tell Me How You Re-Charge, I Will Tell You Where You Drove To

Electric Vehicles Profiling Based on Charging-Current Demand

Charging an EV (Electric Vehicle) comprises two phases: a) resource negotiation, and b) actual charging. While the former phase runs over secure communication protocols, the latter is usually assumed not to be a threat to security and privacy. However, we believe that the physica ...

Knocking on Tangle's Doors

Security Analysis of IOTA Ports

Blockchains are currently deployed in a large number of different scenarios, such as cryptocurrencies, communications, factory automation, and vehicular networks. Both academia's and industry's interest in this technology is motivated by its distributed nature and its inherent se ...

Knocking on Tangle's Doors

Security Analysis of IOTA Ports

Blockchains are currently deployed in a large number of different scenarios, such as cryptocurrencies, communications, factory automation, and vehicular networks. Both academia's and industry's interest in this technology is motivated by its distributed nature and its inherent se ...

Knocking on Tangle's Doors

Security Analysis of IOTA Ports

Blockchains are currently deployed in a large number of different scenarios, such as cryptocurrencies, communications, factory automation, and vehicular networks. Both academia's and industry's interest in this technology is motivated by its distributed nature and its inherent se ...

Knocking on Tangle's Doors

Security Analysis of IOTA Ports

Blockchains are currently deployed in a large number of different scenarios, such as cryptocurrencies, communications, factory automation, and vehicular networks. Both academia's and industry's interest in this technology is motivated by its distributed nature and its inherent se ...