Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2024
IoT-driven blockchain to manage the healthcare supply chain and protect medical records
Future Generation Computer Systems (FGCS), Volume 161, Issue CPages 415–431https://doi.org/10.1016/j.future.2024.07.039AbstractHealthcare supply chain domain and medical records’ management face numerous challenges that come with new demands, such as customer dissatisfaction, rising healthcare costs, tracking and traceability of drugs, and security and privacy related to ...
Highlights- IoT blockchain architecture for preventing access violations in health supply chain.
- Blockchain combined with IoT offers a reliable way to protect medical data.
- Hyperledger Fabric protects sensitive data in a P2P distributed and ...
- surveyNovember 2024JUST ACCEPTED
Open-Ethical AI: Advancements in Open-Source Human-Centric Neural Language Models
This survey summarizes the most recent methods for building and assessing helpful, honest, and harmless neural language models, considering small, medium, and large-size models. Pointers to open-source resources that help to align pre-trained models are ...
- research-articleJuly 2024
NERO: NEural algorithmic reasoning for zeRO-day attack detection in the IoT: A hybrid approach
AbstractAnomaly detection approaches for network intrusion detection learn to identify deviations from normal behavior on a data-driven basis. However, current approaches strive to infer the degree of abnormality of out-of-distribution samples when these ...
- articleNovember 2023
Deep Reinforcement Learning for intrusion detection in Internet of Things: Best practices, lessons learnt, and open challenges
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 236, Issue Chttps://doi.org/10.1016/j.comnet.2023.110016AbstractThe Internet of Things (IoT) scenario places important challenges even for deep learning-based intrusion detection systems. IoTs are highly heterogeneous networks in which multiple types of nodes and connections between them proliferate at a fast ...
Graphical abstractDisplay Omitted
Highlights- Literature review on design of Intrusion Detection Systems for IoT based on Deep Reinforcement Learning.
- Best practices, lessons learnt, and open challenges in this DRL research trend.
- Conditions are identified upon which DRL may ...
- research-articleOctober 2022
Analysis on functionalities and security features of Internet of Things related protocols
Wireless Networks (WIRE), Volume 28, Issue 7Pages 2857–2887https://doi.org/10.1007/s11276-022-02999-7AbstractThe Internet of Things (IoT) paradigm is characterized by the adoption of different protocols and standards to enable communications among heterogeneous and, often, resource-constrained devices. The risk of violation is high due to the wireless ...
-
- review-articleSeptember 2022
Insights into security and privacy towards fog computing evolution
AbstractThe incremental diffusion of the Internet of Things (IoT) technologies and applications represents the outcome of a world ever more connected by means of heterogeneous and mobile devices. IoT scenarios imply the presence of multiple ...
- review-articleApril 2022
Security&privacy issues and challenges in NoSQL databases
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 206, Issue Chttps://doi.org/10.1016/j.comnet.2022.108828AbstractOrganizing the storing of information and data retrieval from databases is a crucial issue, which has become more critical with the spreading of cloud and Internet of Things (IoT) based applications. In fact, not only the network’s ...
- research-articleOctober 2021
Attribute-based encryption and sticky policies for data access control in a smart home scenario: a comparison on networked smart object middleware
- Sabrina Sicari,
- Alessandra Rizzardi,
- Gianluca Dini,
- Pericle Perazzo,
- Michele La Manna,
- Alberto Coen-Porisini
International Journal of Information Security (IJOIS), Volume 20, Issue 5Pages 695–713https://doi.org/10.1007/s10207-020-00526-3AbstractRegulating the access to the Internet of Things (IoT) network’s resources is a complex-prone task, which requires to pay a great attention on how policies are defined, shared, and enforced. The present paper considers the specific context of a ...
- ArticleOctober 2020
Testing and Evaluating a Security-Aware Pub and Sub Protocol in a Fog-Driven IoT Environment
AbstractThe continuous spreading of innovative applications and services, based on the emerging Internet of Things (IoT) paradigm, leads to the need of even more efficient network architectures/infrastructures, in order to support the huge amount of ...
- research-articleOctober 2019
Beyond the smart things: Towards the definition and the performance assessment of a secure architecture for the Internet of Nano-Things
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 162, Issue Chttps://doi.org/10.1016/j.comnet.2019.07.012AbstractDuring the last years, the interest in nano-technologies and nanoscale communications significantly growth in several application domains, such as healthcare, bio-medicine, agro-food, industry, and military/defense. Nano-scale devices ...
- research-articleJune 2018
REATO: REActing TO Denial of Service attacks in the Internet of Things
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 137, Issue CPages 37–48https://doi.org/10.1016/j.comnet.2018.03.020AbstractDenial of Service (DoS) attack represents until now a relevant problem in Internet-based contexts. In fact, it is both difficult to recognize and to counteract. Along with the adoption and diffusion of Internet of Things (IoT) applications, such ...
- articleJanuary 2018
$$\hbox {S}^2$$S2DCC: secure selective dropping congestion control in hybrid wireless multimedia sensor networks
- Michele Tortelli,
- Alessandra Rizzardi,
- Sabrina Sicari,
- Luigi Alfredo Grieco,
- Gennaro Boggia,
- Alberto Coen-Porisini
Thanks to the availability of miniaturized camera and microphones, nowadays Wireless Multimedia Sensor Networks (WMSNs) can sense and deliver audio/video signals from a target environment to remote analysis sites. Hence, new opportunity are disclosed ...
- research-articleNovember 2017
Security towards the edge: Sticky policy enforcement for networked smart objects
Highlights- Distributedly moving data processing, storaging and security at the network edge.
One of the hottest topics in the Internet of Things (IoT) domain relates to the ability of enabling computation and storage at the edges of the network. This is becoming a key feature in order to ensure the ability of managing in a ...
- research-articleJanuary 2017
Performance Comparison of Reputation Assessment Techniques Based on Self-Organizing Maps in Wireless Sensor Networks
Many solutions based on machine learning techniques have been proposed in literature aimed at detecting and promptly counteracting various kinds of malicious attack (data violation, clone, sybil, neglect, greed, and DoS attacks), which frequently ...
- short-paperNovember 2016
Internet of Things: Security in the Keys
Q2SWinet '16: Proceedings of the 12th ACM Symposium on QoS and Security for Wireless and Mobile NetworksPages 129–133https://doi.org/10.1145/2988272.2988280Security threats may hinder the large scale adoption of the emerging Internet of Things (IoT) technologies. Besides efforts have already been made in the direction of data integrity preservation, confidentiality and privacy, several issues are still ...
- research-articleOctober 2016
Security policy enforcement for networked smart objects
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 108, Issue CPages 133–147https://doi.org/10.1016/j.comnet.2016.08.014In the Internet of Things (IoT) heterogeneous technologies concur to the provisioning of customized services able to bridge the gap between the physical and digital realms. Security, privacy and data quality are acknowledged to represent key issues to ...
- articleAugust 2016
A security-and quality-aware system architecture for Internet of Things
Information Systems Frontiers (KLU-ISFI), Volume 18, Issue 4Pages 665–677https://doi.org/10.1007/s10796-014-9538-xInternet of Things (IoT) is characterized, at the system level, by high diversity with respect to enabling technologies and supported services. IoT also assumes to deal with a huge amount of heterogeneous data generated by devices, transmitted by the ...
- tutorialJuly 2016
A Comparative Study of Recent Wireless Sensor Network Simulators
ACM Transactions on Sensor Networks (TOSN), Volume 12, Issue 3Article No.: 20, Pages 1–39https://doi.org/10.1145/2903144Over recent years, the continuous interest in wireless sensor networks (WSNs) has led to the appearance of new modeling methods and simulation environments for WSN applications. A broad variety of different simulation tools have been designed to explore ...
- ArticleJuly 2015
Secure OM2M Service Platform
ICAC '15: Proceedings of the 2015 IEEE International Conference on Autonomic ComputingPages 313–318https://doi.org/10.1109/ICAC.2015.59Machine-to-Machine (M2M) paradigm is one of the main concern of Internet of Things (IoT). Its scope is to interconnect billions of heterogeneous devices able to interact in various application domains. Since M2M suffers from a high vertical ...
- research-articleJanuary 2015
Security, privacy and trust in Internet of Things
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 76, Issue CPages 146–164https://doi.org/10.1016/j.comnet.2014.11.008Internet of Things (IoT) is characterized by heterogeneous technologies, which concur to the provisioning of innovative services in various application domains. In this scenario, the satisfaction of security and privacy requirements plays a fundamental ...