Loading [MathJax]/extensions/MathZoom.js
Francesca Cuomo - IEEE Xplore Author Profile

Showing 1-25 of 118 results

Filter Results

Show

Results

Although the integration between Unmanned Aerial Vehicles (UAVs) and Radio Access Network (RAN) applications is envisioned to enable a variety of new use cases and services, several practical aspects related to autonomous operations over cellular systems are still largely unexplored due to difficulties in testing and validating such integration in the real world. In this paper, we bridge the gap b...Show More
In the Internet of Things (IoT) scenario, two of the most important innovations in recent years are Edge Computing and Low Power technologies, like LoRaWAN. Edge Computing facilitates computations to be executed in proximity to users, delivering advantages such as reduced response times, optimized bandwidth usage, and enhanced scalability for IoT applications. On the other hand, LoRaWAN stands out...Show More
The security and efficiency of low-power wide area networks (LPWANs) for connecting an ever-growing number of IoT devices, expected to exceed 40 billion by 2030, are becoming increasingly important. LoRaWAN, a leading LPWAN technology, enables long-range, low-power communications but remains susceptible to jamming attacks that degrade network performance at the physical layer. This paper introduce...Show More
Next-generation wireless systems, already widely deployed, are expected to become even more prevalent in the future, representing challenges in both environmental and economic terms. This paper focuses on improving the energy efficiency of intelligent and programmable Open Radio Access Network (RAN) systems through the near-real-time dynamic activation and deactivation of Base Station (BS) Radio F...Show More
The growing performance demands and higher deployment densities of next-generation wireless systems emphasize the importance of adopting strategies to manage the energy efficiency of mobile networks. In this demo, we showcase a framework that enables research on Deep Reinforcement Learning (DRL) techniques for improving the energy efficiency of intelligent and programmable Open Radio Access Networ...Show More
Symmetric cryptography is the de-facto approach to information security for ad-hoc underwater acoustic networks. The requirement is that all network nodes possess the same cryptographic keys and key distribution that happens offline. Thus, it is hardly possible to include a new keyless node during network operation. In addition, online key replenishment is an open problem. In this article, we tack...Show More
The wireless spectrum’s increasing complexity poses challenges and opportunities, highlighting the necessity for real-time solutions and robust data processing capabilities. Digital Twin (DT), virtual replicas of physical systems, integrate real-time data to mirror their real-world counterparts, enabling precise monitoring and optimization. Incorporating DTs into wireless communication enhances pr...Show More
The application of the Internet of Things (IoT) for environmental sustainability in the context of smart Water Distribution Systems (WDSs) is gaining more and more interest with the aim to preserve one of our most precious resources. Indeed, effective water monitoring is fundamental to identify faults, to optimize resource allocation, and to ensure a reliable delivery of clean water. Leveraging th...Show More
Non-Intrusive Load Monitoring (NILM) enables the estimation of individual appliances’ energy footprints from the total household consumption without the cost and complexity of installing a specific smart meter per device. By providing users with real-time feedback on their energy consumption, NILM is known to foster conservation habits. The widespread diffusion of smart home meters has enabled the...Show More
LoRaWAN is a Low Power infrastructure for the Internet of Things (IoT) with a centralized architecture where a single node, the network server, handles all data collection and network management decisions. Given the proliferation and widespread adoption of IoT devices, it becomes essential to incorporate Big Data paradigms at the network server to efficiently manage the enormous volumes of data. I...Show More
The high-impact scenario of UAV live uplink streaming is gaining significant interest in diverse applications, such as ambient monitoring, disaster rescue, and smart surveillance. This paper addresses the problem of uplink streaming by a fleet of camera-equipped UAVs, with one UAV acting as the sink, collecting and transmitting videos from the others. We demonstrate that performing video stabiliza...Show More
Water usage in residential buildings highly impacts the overall urban demand. Following the release of the first public high-resolution smart meter data at the fixture level, we envision that extending non-intrusive load monitoring to water disaggregation will avoid installing one smart meter per appliance while still providing users with insights into their consumption habits, which eventually pr...Show More
Internet Exchange Points(IXPs) play a fundamental role in the exchange of data between Internet Service Providers(ISPs). However, they face one of the main challenges of the Border Gateway Protocol(BGP): trust-based route sharing. This feature introduces a series of vulnerabilities that can be exploited by attackers to hijack or disrupt traffic. Despite the presence of various countermeasures such...Show More
The Open Radio Access Network (RAN) architecture has introduced new elements in the RAN, i.e., the RAN Intelligent Controllers (RICs), which allow for closed-loop control of the physical infrastructure through custom, data-driven, intelligent applications. At the near-real-time RIC, xApps access RAN nodes through the E2 interface and offer the option to host traditional algorithms or data-driven D...Show More
LoRaWAN networks have become popular for enabling long-range, low-power connectivity in Internet of Things (IoT) applications. Traditional LoRa Wannetworks typically rely on a centralized architecture, which may pose limitations regarding scalability, reliability, and adaptability. In contrast, decentralized LoRaWAN networks offer a compelling alternative with several distinct features. This study...Show More
5G and beyond mobile networks will support heterogeneous use cases at an unprecedented scale, thus demanding automated control and optimization of network functionalities customized to the needs of individual users. Such fine-grained control of the Radio Access Network (RAN) is not possible with the current cellular architecture. To fill this gap, the Open RAN paradigm and its specification introd...Show More
Smart water grids (SWGs) are an emerging technology that combines the power of the Internet of Things (IoT) with advanced water management systems. These grids are designed to monitor and control water distribution in a more efficient and sustainable way, thus they are becoming increasingly important as water resources become scarcer. The key feature of SWGs is the ability to collect data in a con...Show More
Bluetooth Low Energy (BLE) is one of the most promising low-power, short-range wireless technologies, providing a standardized technology for creating mesh networks and enabling devices to communicate with each other with limited impact on the battery. BLE Mesh networks support a variety of features, including broadcast, unicast, and multicast messaging, allowing devices to communicate in a distri...Show More
Border Gateway Protocol (BGP) is the standard protocol used for inter-domain routing in the Internet. Since it was designed without built-in security mechanisms, nowadays it results in being vulnerable to various security issues. Although countermeasures exist to secure BGP sessions, they are not widely used due to lack of knowledge and complexity of the setup. The aim of this paper is to raise aw...Show More
The optimization and digitalization of Water Distribution Networks (WDNs) are becoming key objectives in our modern society. Indeed, WDNs are typically old, worn and obsolete. These inadequate conditions of the infrastructures lead to significant water loss due to leakages inside pipes, junctions and nodes. It has been measured that in Europe the average value of lost water is about 26 %. Leakage ...Show More
LoRaWAN is a wireless technology developed to transmit over long distances using low power. It runs over the proprietary LoRa radio modulation and provides fundamental IoT requirements such as bi-directional communication, end-to-end security, key management, mobility, and localization services. Despite LoRaWAN guarantees confidentiality and integrity of application payload, the wireless nature of...Show More
Bluetooth Low Energy (BLE) is a pervasive wireless technology all around us today. It is included in most commercial consumer electronic devices manufactured in last years, and billions of BLE-enabled devices are produced every year, including wearable or portable ones like smartphones, smart-watches and smartbands. The success of BLE as a cornerstone in IoT and consumer electronics is both an adv...Show More
LoRaWAN is certainly one of the most widely used LPWAN protocol. The LoRaWAN 1.1 specification aims at fixing some serious security vulnerabilities in the 1.0 specification, however there still exist critical points that may affect the IoT security. In this demo, we show an attack that can affect LoRaWAN 1.0 and 1.1 networks, which hijacks the downlink path from the Network Server to an End Device...Show More
This article describes HIRO-NET, an Heterogeneous Intelligent Robotic Network. HIRO-NET is an emergency infrastructure-less network that aims to address the problem of providing connectivity in the immediate aftermath of a natural disaster, where no cellular or wide area network is operational and no Internet access is available. HIRO-NET establishes a two-tier wireless mesh network where the Lowe...Show More
With the rise of the IoT, many protocols have been developed in order to fulfill the need for a wireless connectivity that assures energy efficiency and low-data rates. LoRaWAN is certainly one of the most widely used protocols. The LoRaWAN 1.1 specification aims to fix some serious security vulnerabilities in the 1.0 specification, however there still exist critical points to address. In this pap...Show More