Enrico Bassetti

Enrico Bassetti
  • Ph.D.
  • Research fellow at European Space Agency

Researcher on network security.

About

18
Publications
2,325
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
62
Citations
Introduction
MSc Cybersecurity, sysadmin/netadmin and software developer. Skilled on Windows/Linux server administration, protocols/systems integration and compatibility, system architecture design, network administration. Interested in network security, Internet-of-Things security, and cyber ranges.
Current institution
European Space Agency
Current position
  • Research fellow
Additional affiliations
February 2024 - September 2024
Delft University of Technology
Position
  • Postdoc Researcher
November 2019 - May 2023
Sapienza University of Rome
Position
  • PhD Student
May 2023 - January 2024
Sapienza University of Rome
Position
  • PostDoc researcher
Education
October 2019 - May 2023
Sapienza University of Rome
Field of study
  • Computer Science
October 2017 - July 2019
September 2011 - December 2017

Publications

Publications (18)
Conference Paper
LoRa is a promising technology in the current Internet of Things market, which operates in un-licensed bands achieving long-range communications and with ultra power devices. In this work we capitalize on the idea introduced in [1], i.e. balance the Air-Time of the different modulation spreading factors (SF), and adapt it to operate in a typical me...
Conference Paper
Full-text available
Security and dependability of devices are paramount for the IoT ecosystem. Message Queuing Telemetry Transport protocol (MQTT) is the de facto standard and the most common alternative for those limited devices that cannot leverage HTTP. However, the MQTT protocol was designed with no security concern since initially designed for private networks of...
Preprint
Full-text available
Since the origins of the Internet, various vulnerabilities exploiting the IP fragmentation process have plagued IPv4 protocol, many leading to a wide range of attacks. IPv6 modified the handling of fragmentations and introduced a specific extension header, not solving the related problems, as proved by extensive literature. One of the primary sourc...
Chapter
Full-text available
Since the origins of the Internet, various vulnerabilities exploiting the IP fragmentation process have plagued IPv4 protocol, many leading to a wide range of attacks. IPv6 modified the handling of fragmentations and introduced a specific extension header, not solving the related problems, as proved by extensive literature. One of the primary sourc...
Conference Paper
When an earthquake occurs, it is crucial to quickly estimate its epicenter coordinates and the most affected areas to inform rescue decision-making. Current seismological services perform this estimation relying on centralized processing. On the other hand, we propose a fully decentralized architecture that uses edge computation on a network of sen...
Article
Full-text available
Cruising-for-parking in an urban area is a time-consuming and frustrating activity. We present four machine learning-based models to predict the parking availability of street segments in an urban area on a three-level scale, which navigator and smart-parking apps can exploit to ease and reduce the cruising phase. The models were trained with data...
Article
Full-text available
State-of-the-art Earthquake Early Warning systems rely on a network of sensors connected to a fusion center in a client–server paradigm. The fusion center runs different algorithms on the whole data set to detect earthquakes. Instead, we propose moving computation to the edge, with detector nodes that probe the environment and process information f...
Article
Full-text available
Smartphone sensors can collect data in many different contexts. They make it feasible to obtain large amounts of data at little or no cost because most people own mobile phones. In this work, we focus on collecting motion data in the car using a smartphone. Motion sensors, such as accelerometers and gyroscopes, can help obtain information about the...
Article
Full-text available
Smartphone sensors can collect data in many different contexts. They make it feasible to obtain large amounts of data at little or no cost because most people own mobile phones. In this work, we focus on the collection of smartphone data in the car. Motion sensors, such as accelerometers and gyroscopes, can help obtain information about the vehicle...
Preprint
Full-text available
Earthquake Early Warning state of the art systems rely on a network of sensors connected to a fusion center in a client-server paradigm. Instead, we propose moving computation to the edge, with detector nodes that probe the environment and process information from nearby probes to detect earthquakes locally. Our approach tolerates multiple node fau...
Chapter
Full-text available
On-street parking places parallel to the curb have variable lengths, depending on the size of the car that emptied the place. Thus, a Smart Parking system should publish such places only to drivers whose car is shorter than the available parking length. We developed a crowdsourced Smart Parking app, based on implicit interaction, intending to publi...
Preprint
Full-text available
Security and dependability of devices are paramount for the IoT ecosystem. Message Queuing Telemetry Transport protocol (MQTT) is the de facto standard and the most common alternative for those limited devices that cannot leverage HTTP. However, the MQTT protocol was designed with no security concern since initially designed for private networks of...
Preprint
Full-text available
Networks of IoT devices often require configuration and definition of behavior by the final user. Node-RED is a flow-based programming platform commonly used for End User Development, but it requires networking and protocols skills in order to be efficiently used. We add a level of abstraction to Node-RED nodes in order to allow non-skilled users t...
Conference Paper
Full-text available
Networks of IoT devices often require configuration and definition of behavior by the final user. Node-RED is a flow-based programming platform commonly used for End User Development, but it requires networking and protocols skills in order to be efficiently used. We add a level of abstraction to Node-RED nodes in order to allow non-skilled users t...
Preprint
LoRa is a promising technology in the current Internet of Things market, which operates in un-licensed bands achieving long-range communications and with ultra power devices. In this work we capitalize on the idea introduced in [1], i.e. balance the Air-Time of the different modulation spreading factors (SF), and adapt it to operate in a typical me...

Network

Cited By