AB

Alessandro Brighente

45 records found

Authored

Channel hopping is a well-known methodology to dynamically allocate frequency resources to nodes in wireless communication systems. The aim of channel hopping is to mitigate possible interference issues caused by both legitimate and malicious users. The state-of-the-art channe ...

Initially designed to represent ownership of various assets, Non-Fungible Tokens (NFTs) have emerged as a new tool in the blockchain domain for investment and trading. The NFT markets are rapidly budding with significant growth in trading volumes over the last few years. While ...

The largely distributed nature of fog computing (FC) provides a major attack surface with increased possibilities for attackers. Compared to networks with higher centralization, securing an FC network represents a significant challenge. This issue is complicated since edge nod ...

The inclusion of drones in Internet of Vehicles (IoV) is a current trend that presents significant trade-offs. On the one hand, Unmanned Aerial Vehicles (UAVs) provide advantages such as enabling ground communications also when physical obstacles limit the connectivity. On the ...

Hide and Seek

Privacy-Preserving and FAA-compliant Drones Location Tracing

Due to the frequent unauthorized invasions by commercial drones to Critical Infrastructures (CIs), the US-based Federal Avionics Administration (FAA) recently published a new specification, namely RemoteID. Such a rule requires all drones to broadcast information about their i ...

An IoT Inventory Before Deployment

A Survey on IoT Protocols, Communication Technologies, Vulnerabilities, Attacks, and Future Research Directions

The Internet of Things (IoT) is a pervasive phenomenon in our everyday life, binding and enabling communication between heterogeneous physical devices and the internet. The applications of this technology range from industrial control to medical devices, hence interconnecting ...

Should I Mine or Should I Break

On the Worthiness of Brute-Forcing Cryptocurrency Addresses

Cryptocurrencies are digital assets that can be used as a medium of exchange and are stored in a ledger in the form of a cryptography-secured computer database. Most cryptocurrencies are deployed in decentralized networks such as the blockchain, where they can be transferred f ...

SETCAP

Service-Based Energy-Efficient Temporal Credential Authentication Protocol for Internet of Drones

Internet of Drones (IoD) is a framework to set up drones networks that may serve multiple purposes, e.g., data collection. New IoD applications (such as drone assisted internet of vehicles) envision the simultaneous collection of multiple data types. Although authentication ma ...

The 6TiSCH standard provides minimum latency and reliability in mission-critical IoT applications. To optimize resource allocation during 6TiSCH network formation, IETF released the 6TiSCH minimal configuration (6TiSCH-MC) standard. 6TiSCH-MC considered IETF's IPv6 Routing Pro ...

MeLSeC

A Method for Lightweight and Secure Communication in Internet of Vehicles

Autonomous message propagation in Internet of Vehicles (IoV) need to be secure to guarantee safety. In fact, a malicious user propagating false information may cause accidents impacting on the safety of both vehicles and drivers. Authentication should however account for the t ...

Received signal Direction of Arrival (DOA) estimation represents a significant problem with multiple applications, ranging from wireless communications to radars. This problem presents significant challenges, mainly given by a large number of closely located transmitters being ...

Visible Light Communication (VLC) is one the most promising enabling technology for future 6G networks to over-come Radio-Frequency (RF)-based communication limitations thanks to a broader bandwidth, higher data rate, and greater efficiency. However, from the security perspect ...

Stopping Floods with Buckets

Attack and Countermeasure for IOTA Autopeering

Distributed Ledger Technology (DLT) is one of the most promising technology at present with applications in different domains, such as Cyber-Physical Systems (CPS) and Internet of Thing (IoT). IOTA is an example of Directed Acyclic Graph (DAG)-based DLTs applicable to IoT, add ...

SWAP

Secure Warning Messages Authentication and Propagation in Internet of Vehicles

The sensing and communication capabilities of the Internet of Vehicles (IoV) allow for the design of safer Intelligent Transportation Systems (ITS), with capabilities for reduced crashes and drivers' injuries. To this aim, entities in the IoV can autonomously exchange Warning ...

FOLPETTI

A Novel Multi-Armed Bandit Smart Attack for Wireless Networks

Channel hopping provides a defense mechanism against jamming attacks in large scale Internet of Things (IoT) networks. However, a sufficiently powerful attacker may be able to learn the channel hopping pattern and efficiently predict the channel to jam. In this paper, we prese ...

Reputation plays a fundamental role in the blockchain ecosystem, as it provides means to assign trust levels to participating nodes. Reputation is usually gained in time: The higher the fair participation of a node to the network, the higher its reputation. IOTA's Coordicide p ...

The Fifth Generation of Communication Networks (5G) envisions a broader range of services compared to previous generations, supporting an increased number of use cases and applications. The broader application domain leads to increase in consumer use and, in turn, increased ha ...

Knocking on Tangle's Doors

Security Analysis of IOTA Ports

Blockchains are currently deployed in a large number of different scenarios, such as cryptocurrencies, communications, factory automation, and vehicular networks. Both academia's and industry's interest in this technology is motivated by its distributed nature and its inherent ...

Tell Me How You Re-Charge, I Will Tell You Where You Drove To

Electric Vehicles Profiling Based on Charging-Current Demand

Charging an EV (Electric Vehicle) comprises two phases: a) resource negotiation, and b) actual charging. While the former phase runs over secure communication protocols, the latter is usually assumed not to be a threat to security and privacy. However, we believe that the phys ...

Contributed

The upcoming IEEE 802.1CB standard aims to solve performance and reliability issues in Time-Sensitive Networking (TSN). Mission-critical systems often use these standards for communication in automotive, industrial, and avionic networks. However, researchers did not sufficiently ...