Alessandra Rizzardi

Alessandra Rizzardi
  • MS Degree in Computer Science
  • Researcher at University of Insubria

About

55
Publications
74,341
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,408
Citations
Introduction
Dr. Alessandra Rizzardi received BS and MS degree in Computer Science 110/110 cum laude at the University of Insubria in Varese (Italy), in 2011 and 2013. In 2016 she got her Ph.D. in Computer Science and Computational Mathematics at DiSTA. Her research activity, conducted in the group of Prof. Prof. Alberto Coen Porisini and Prof. Sabrina Sicari, is focused on WSN and IoT security and privacy issues. Now she is Assistant Professor in Software Engineer at the University of Insubria.
Current institution
University of Insubria
Current position
  • Researcher
Additional affiliations
April 2020 - present
University of Insubria
Position
  • Professor (Assistant)
December 2016 - March 2020
University of Insubria
Position
  • PostDoc Position
November 2013 - November 2016
University of Insubria
Position
  • PhD Student
Education
November 2011 - November 2013
University of Insubria
Field of study
  • Computer Science
November 2008 - November 2011
University of Insubria
Field of study
  • Computer Science
November 2008 - November 2011
University of Insubria
Field of study
  • Computer Science

Publications

Publications (55)
Research Proposal
Open Position for Research at the University of Insubria (Varese - Italy). More information at: https://www.uninsubria.it/bandi-e-concorsi/assegno-di-ricerca-dipartimentale-serena-architettura-di-rete-sicura-e-affidabile English version: https://www.uninsubria.eu/opportunity/departmental-research-grant-serena-secure-and-reliabile-network-architectu...
Article
The incremental diffusion of the Internet of Things (IoT) technologies and applications represents the outcome of a world ever more connected by means of heterogeneous and mobile devices. IoT scenarios imply the presence of multiple data producers (e.g., sensors, actuators, RFID, NFC) and consumers (e.g., end-user devices, such as smartphones, tabl...
Article
Full-text available
Security and privacy of information transmitted among the devices involved in an Internet of Things (IoT) network represent relevant issues in IoT contexts. Guaranteeing effective control and supervising access permissions to IoT applications is a complex task, mainly due to resources' heterogeneity and scalability requirements. The design and deve...
Article
Full-text available
This survey summarizes the most recent methods for building and assessing helpful, honest, and harmless neural language models, considering small, medium, and large-size models. Pointers to open-source resources that help to align pre-trained models are given, including methods that use parameter-efficient techniques, specialized prompting framewor...
Conference Paper
Full-text available
The rapid expansion of the Internet of Things (IoT), now with billions of mainly wireless interconnected devices, has brought concerns and challenges regarding the security of IoT networks and devices, as they are often vulnerable to attacks. In this article, a measurement campaign is carried out to investigate the path loss experienced by a portab...
Research Proposal
Full-text available
Open Position for Research at the University of Insubria (Varese - Italy). More information at: https://www.uninsubria.it/opportunita/assegno-di-ricerca-junior-espe-enforcing-security-and-privacy-edge-iot-network%E2%80%9D-un English version: https://www.uninsubria.eu/opportunity/junior-grant-%E2%80%9Cespe-enforcing-security-and-privacy-edge-iot-n...
Article
Full-text available
The Internet of Things (IoT) paradigm is characterized by the adoption of different protocols and standards to enable communications among heterogeneous and, often, resource-constrained devices. The risk of violation is high due to the wireless nature of the communication protocols usually involved in the IoT environments (e.g., e-health, smart agr...
Article
Full-text available
Organizing the storing of information and data retrieval from databases is a crucial issue, which has become more critical with the spreading of cloud and Internet of Things (IoT) based applications. In fact, not only the network’s traffic has increased, but also the amount of memory and the mechanisms needed to manage the so-called Big Data effici...
Article
Patients’ remote monitoring becomes even more crucial due to the spreading of the COVID-19 disease. Hospitals cannot accommodate all the patients who need to be taken care. Hence, tele-medicine or, as also named, tele-health, remains the only means available to keep the situation under control. In particular, it is important to monitor the patients...
Article
Full-text available
Regulating the access to the Internet of Things (IoT) network’s resources is a complex-prone task, which requires to pay a great attention on how policies are defined, shared, and enforced. The present paper considers the specific context of a smart home, which represents one of the main IoT application domains, and it focuses on two solutions prop...
Article
Full-text available
Nowadays, the capability of rapidly designing and prototyping, simple, yet real domotics systems (e.g., smart homes and smart buildings applications) is even more compelling, due to the availability and increasing spread of Internet of Things (IoT) devices. Home automation services enable the remote monitoring of indoor environments and facilities....
Chapter
Full-text available
The continuous spreading of innovative applications and services, based on the emerging Internet of Things (IoT) paradigm, leads to the need of even more efficient network architectures/infrastructures, in order to support the huge amount of information to be transmitted in real-time. Hence, new protocols and mechanisms must be conceived to allow t...
Conference Paper
Full-text available
People are increasingly surrounded by a connected world, where they can gather and share information everywhere, at anytime, and by means of a variety of devices, belonging to the so-called Internet of Things (IoT) network. IoT technologies and applications are spreading in different scenarios, ranging from everyday life activities to business ones...
Article
Full-text available
Now reaching 2020, the world is witnessing the initial diffusion of 5G networks, which promise to revolutionize the mobile wireless communications, providing faster services, very low delays, and a very pervasive connectivity via mobile devices. It is worth to remark that the main paradigm which will take advantage from 5G is really the Internet of...
Article
Full-text available
The growing diffusion of the technologies related to the Internet of Things (IoT) paradigm not only facilitates the connectivity among a huge amount of different devices, but also the variety of applications and services which can be provided to users. Everyday objects, equipped with the technologies involved in such a paradigm, become smart and ar...
Article
Full-text available
In the digital age, where the Internet connects things across the globe and individuals are constantly online, data security and privacy are becoming key drivers (and barriers) of change for adoption of innovative solutions. Traditional approaches, whereby communication links are secured by means of encryption, and access control is run in a static...
Article
Full-text available
The paper proposes the use of Node-RED, a flow-based programming tool targeted to Internet of Things (IoT), along with a series of case studies related to different IoT contexts, which demonstrate Node-RED's potentialities and outcomings towards the realization of well-structured IoT environments. The analyzed applications potentially include a wid...
Article
Full-text available
During the last years, the interest in nano-technologies and nanoscale communications significantly growth in several application domains, such as healthcare, bio-medicine, agro-food, industry, and military/defense. Nano-scale devices are able to interact with each others, with existing communication networks and, ultimately, with the Internet. As...
Article
Full-text available
A clever and efficient management of transport and logistics are fundamental in manufacturer companies, starting to adopt new methodologies, inspired to the emerging industry 4.0 principles. Such a behavior is influenced by the spreading of the Internet of Things (IoT) paradigm, helping to automate a lot of features, if not all, of products’ manage...
Article
Full-text available
Letting both data producers and data consumers be aware of the levels of security and privacy guaranteed within an IoT-based system represents an important goal to be pursued. In fact, the presence of multiple and heterogeneous data sources, as well as wireless communication standards, increases the risk of violation in IoT scenarios. Besides contr...
Article
Full-text available
Denial of Service (DoS) attack represents until now a relevant problem in Internet-based contexts. In fact, it is both difficult to recognize and to counteract. Along with the adoption and diffusion of Internet of Things (IoT) applications, such an issue has become more urgent to solve, due to the presence of heterogeneous data sources and to the w...
Article
Full-text available
Both people and organization are widely accepting and adopting the functionalities offered by the smart home or smart building applications. This is due to the many advantages, in easing users’ every-day life and work, provided by the emerging Internet of Things (IoT) technologies and devices, equipped with sensors, cameras, or actuators, and able...
Chapter
Full-text available
The diffusion of Internet of Things (IoT) technologies enables the provision of advanced and valuable services, but also raises several challenges. First of all, the increasing number of heterogeneous interconnected devices creates scalability and interoperability issues and thus a flexible middleware platform is needed to manage all the sources to...
Article
Full-text available
Many solutions based on machine learning techniques have been proposed in literature aimed at detecting and promptly counteracting various kinds of malicious attack (data violation, clone, sybil, neglet, greed, DoS attacks), which frequently affect Wireless Sensor Networks (WSN). Besides recognizing the corrupted or violated information, also the a...
Article
Full-text available
Security and privacy represent critical issues for a wide adoption of IoT technologies both by industries and people in their every-day life. Besides, the complexity of an IoT system’s management resides in the presence of heterogeneous devices, which communicate by means of different protocols and provide information belonging to various applicati...
Article
Full-text available
One of the hottest topics in the Internet of Things (IoT) domain relates to the ability of enabling computation and storage at the edges of the network. This is becoming a key feature in order to ensure the ability of managing in a scalable way service requests with low response times. This means being able to acquire, store, and process IoT-genera...
Article
Full-text available
Internet of Things (IoT) is characterized by heterogeneous technologies, which concur to the provisioning of innovative services in different application domains. Introducing efficient mechanisms for collecting, processing, and delivering data generated by sensors, medical equipment, wearable devices, and humans, is a key enabling factor for advanc...
Article
Full-text available
Internet of Things (IoT) is characterized by heterogeneous technologies, which concur to the provisioning of innovative services in different application domains. Introducing efficient mechanisms for collecting, processing, and delivering data generated by sensors, medical equipment, wearable devices, and humans, is a key enabling factor for advanc...
Conference Paper
Full-text available
Security, interoperability, scalability, and mobility support are key challenges for the Internet of Things (IoT). Information Centric Networking (ICN) is an emerging paradigm for the Future Internet design that brings all the potential to face these challenges thanks to name-driven networking primitives. As a matter of fact, ICN natively supports...
Conference Paper
Full-text available
Security threats may hinder the large scale adoption of the emerging Internet of Things (IoT) technologies. Besides efforts have already been made in the direction of data integrity preservation, confidentiality and privacy, several issues are still open. The existing solutions are mainly based on encryption techniques, but no attention is actually...
Article
Full-text available
Thanks to the availability of miniaturized camera and microphones, nowadays Wireless Multimedia Sensor Networks (WMSNs) can sense and deliver audio/video signals from a target environment to remote analysis sites. Hence, new opportunity are disclosed for advanced applications in health care, surveillance, military, and traffic monitoring domains, t...
Conference Paper
Full-text available
The continuous interest in Wireless Sensor Networks (WSN) has led to the development of several applications, from traditional monitoring, to cooperative and distributed control and management systems, to automated industrial machinery and logistics. The design and optimization of specialized WSN platforms and communication protocols typically reli...
Article
Full-text available
Over recent years, the continuous interest in wireless sensor networks (WSNs) has led to the appearance of new modeling methods and simulation environments for WSN applications. A broad variety of different simulation tools have been designed to explore and validate WSN systems before actual implementation and real-world deployment. These tools add...
Article
Full-text available
The increasing diffusion of services enabled by Internet of Things (IoT) technologies raises several risks associated to security and data quality. Together with the high number of heterogeneous interconnected devices, this creates scalability issues, thereby calling for a flexible middleware platform able to deal with both security threats and dat...
Conference Paper
The satisfaction of security and data quality requirements plays a fundamental role in the Internet of Things (IoT) scenario. Such a dynamic environment requires the adoption of heterogeneous technologies to provide customized services in various application domains and both security threats and data quality issues need to be addresses in order to...
Conference Paper
Full-text available
Internet of Things (IoT) involves heterogeneous technologies (i.e., WSN, RFID, actuators) able to exchange data acquired from the environment in order to provide services to the requesting users. In such a scenario the privacy and the quality (i.e., in terms of accuracy, timeliness, completeness) of the handled information represent critical issues...
Conference Paper
Full-text available
Secure data aggregation still represents a very challenging topic in wireless sensor networks’ research. In fact, only few solutions exists to face, simultaneously, confidentiality, integrity, adaptive aggregation, and privacy issues. Furthermore, proposals available in literature mainly assume flat network architectures, without leveraging the pec...

Network

Cited By