Peppino Fazio

Peppino Fazio
Ca' Foscari University of Venice | UNIVE · Department of Molecular Science and Nanosystems

Associate Professor - HOME PAGE: http://peppinofazio.com

About

166
Publications
41,533
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,179
Citations
Additional affiliations
May 2004 - October 2015
University of Calabria
Position
  • Professor (Assistant)

Publications

Publications (166)
Article
Alzheimer-Perusini’s disease (AD) is a severe neurodegenerative pathology mostly characterized by memory loss, with aging as a significant risk factor. While normal aging involves non-pathological changes in the brain, pathological aging involves the formation of neuronal plaques, leading to neuronal death and the macroscopic shrinkage of major bra...
Article
Full-text available
Network emulators are essential in testing network systems, applications, and protocols. Emulators bridge the gap between simulation setups that lack realism in results and real-world trials that are accurate but often expensive, non-reproducible, and uncontrollable. This paper describes the simulations and emulations of the national Czech QKD netw...
Article
Full-text available
The complexity of our brains can be described as a multi-layer network: neurons, neural agglomerates, and lobes. Neurological diseases are often related to malfunctions in this network. We propose a conceptual model of the brain, describing the disease as the result of an operator affecting and disrupting the network organization. We adopt the form...
Article
Full-text available
The onset and progression of a neurological disease can often be explained in terms of brain-network alteration. They can be formalized as the action of an operator representing the disease, the so-called K -operator, acting on the network. The healing process can thus be seen as the inverse of the disease mechanism. However, perfect healing is oft...
Article
Full-text available
Some of the most deployed infrastructures nowadays are Overlay Networks (ONs). They consist of hardware and software components designed to establish private and secure communication channels, typically over the Internet. ONs are among the most reliable technologies for achieving this objective and represent the next-generation solution for secure...
Preprint
Full-text available
Secure communication makes the widespread use of telecommunication networks and services possible. With the constant progress of computing and mathematics, new cryptographic methods are being diligently developed. Quantum Key Distribution (QKD) is a promising technology that provides an Information-Theoretically Secure (ITS) solution to the secret-...
Article
Full-text available
Nowadays, some of the most well-deployed infrastructures are Virtual Private Networks (VPNs) and Overlay Networks (ONs). They consist of hardware and software components designed to build private/secure channels, typically over the Internet. They are currently among the most reliable technologies for achieving this objective. VPNs are well-establis...
Article
Full-text available
In modern network security setups, Intrusion Detection Systems (IDS) are crucial elements that play a key role in protecting against unauthorized access, malicious actions, and policy breaches. Despite significant progress in IDS technology, two of the most major obstacles remain: how to avoid false alarms due to imbalanced data and accurately fore...
Article
Full-text available
The brain is a complex network, and diseases can alter its structures and connections between regions. Therefore, we can try to formalize the action of diseases by using operators acting on the brain network. Here, we propose a conceptual model of the brain, seen as a multilayer network, whose intra-lobe interactions are formalized as the diagonal...
Article
Network emulators play an important role in testing network systems, applications, and protocols. Emulators bridge the gap between simulation setups that lack realism in results and real-world trials that are accurate but often expensive, non-reproducible, and uncontrollable. This article presents an extended model of the Quantum Key Distribution N...
Chapter
Swarms of robots can be thought of as networks, using the tools from telecommunications and network theory. A recent study designed sets of aquatic swarms of robots to clean the canals of Venice, interacting with computers on gondolas. The interaction between gondolas is one level higher in the hierarchy of communication. In other studies, pairwise...
Chapter
In this paper, we investigate an application of the Intelligent Reflecting Surface (IRS). This technology has emerged as promising and low-cost technology for \(6\mathrm{G}\) networks improving wireless communications by collecting dispersed radio waves and redirecting them to the intended destination users. We characterize the achievable rate when...
Article
Full-text available
Over the last decade, 5G and forthcoming 6G architectures have undergone extensive standardization and preparations for the future. The literature in this field is saturated with studies on predicting mobile trajectories in cellular systems and guaranteeing quality of service and an adequate user experience in these environments. The current study...
Article
Over the last few decades, the classification and prediction of mobility trajectories in dynamic networks have become major research topics. Switching of mobility areas (hand-over) in modern cellular networks is frequent due to restricted coverage area and node speeds (urban, highway, etc.). Accurate management of hand-over events is highly desirab...
Article
Every attempt to access to the Internet through a web browser, email sent, VPN connection, VoIP call, instant message or other use of telecommunications systems involves cryptographic techniques. The most commonly applied technique is asymmetric cryptography, which is generally executed in the background without the user even being aware. It establ...
Article
Full-text available
In this study, we investigate the trade-off between reliability and security in unmanned aerial vehicle (UAV) communications systems, considering a UAV-terrestrial network aided by a relay powered by a dedicated power beacon. For this system, we derive the outage probability (OP) under both exact and approximate frameworks and compute the approxima...
Article
Full-text available
With the low integration costs and quick development cycle of all-IP-based 5G+ technologies, it is not surprising that the proliferation of IP devices for residential or industrial purposes is ubiquitous. Energy scheduling/management and automated device recognition are popular research areas in the engineering community, and much time and work hav...
Article
Full-text available
This paper studies a decode-and-forward (DF) full-duplex cooperative relaying network, whereas one transmitter S transmits information to one receiver D via the help of a relay R. In particular, the transmitter can simultaneously transmit energy and information (SWIPT) to relay R using time-switching (TS) method. Then, relay R can utilize the harve...
Chapter
Because quantum key distribution is a technology for establishing keys for symmetric encryption (preferably one-time pads, but more practically keys for AES or other conventional symmetric cryptography), end-to-end confidentiality or authentication requires a deeper look into network structure and comes with additional assumptions.
Chapter
Establishing secure cryptographic keys through an untrusted network is a fundamental cryptographic task. While the use of public key infrastructure based on computational intractability assumptions prevail, these solutions remain theoretically breakable. They are under constant threat as computational power continues to increase, new algorithms are...
Chapter
The basis of all modern networks is device which is able to manage and control network traffic. The fundamental network device is a router that connects at least two networks and has traffic directing functions. From a logical point of view, a router is the intersection of links forming a network. Its task is to accept incoming packets, analyze des...
Chapter
Modern telecommunications networks are based on packet-switching traffic processing and the methodology by which packets can be delivered using an arbitrary route. However, for some applications, merely finding the route to destination is insufficient. Applications can place multiple parameters in their requests, starting from the time it takes the...
Conference Paper
A QKD network can be considered an add-on technology to a standard communication network that provides IT-secure cryptographic keys as a service. As a result, security challenges resulting in the suspension of functional work must be addressed. This study analyzes a Denial of Service (DoS) attack on the Key Management System (KMS), one of the criti...
Chapter
The conceptual composition of a QKD link into quantum and physical channels corresponds to similar connections in the physical world and does not preclude the dual use of fibres as both a classic and quantum channel (in fact, the SECOQC network was built on existing fibre-optic cables). Viewed from a logical perspective, the network consists of mor...
Article
The field of mobility prediction has been widely investigated in the recent past, especially the reduction of the coverage radius of cellular networks, which led to an increase in hand-over events. Changing the cell coverage very frequently, for example, may lead to service disruptions if a predictive approach is not deployed in the system. Althoug...
Chapter
The development of electronic and optical components has led to greater interest in the application of QKD solutions in everyday life. In this section, we briefly describe the currently attractive trends and approaches for future research in the field of QKD technologies.
Chapter
Quality of Service (QoS) architecture models the structure and methods of applying QoS mechanisms to satisfy QoS objectives. It is often referred to the QoS model because it uniquely defines which QoS mechanisms (such as those listed in Sect. 2.3) are used and how they are implemented. QoS architecture also defines network traffic processing polici...
Chapter
Generally, the need for and the type of signaling, or more strictly speaking, the QoS signaling protocol depends on the applied QoS architecture. Here, we distinguish between the signal and the signaling protocol, which in the literature elsewhere are commonly applied as synonyms.
Chapter
Users’ mobility has a huge impact on the performance of cellular networks. Acknowledge users’ multiple next locations plays an important role in various aspects which can be mentioned as helping the base stations to pre-calculate and allocate the resource to users faster and more efficiently, shortening the duration of the handover process, reducin...
Article
Full-text available
Many studies in literature have shown that the bandwidth of an ongoing flow can dynamically change during multimedia sessions and an efficient bandwidth prediction scheme must be employed in order to guarantee the needed Quality of Service. Many contributions in literature focused on some specific reservation schemes for cellular systems, 3G/4G/5G...
Article
In the current era of mobile communications and next-generation networks, mobility analysis has a key role in guaranteeing the quality of service/experience in the available services. Although a vast amount of work has analyzed mobility from both analytic and stochastic points of view, much of it has focused on a time-based analysis and disregarded...
Article
Full-text available
In this work, we investigate the performance analysis of a device-to-device (D2D) communication network under an eavesdropper E attack. Besides, we assume that E is located in the proximal region where it can overhear the information from the source S. Specifically, S transmits information to the destination D, adopting the power beacon's energy to...
Article
Full-text available
In the present paper, we investigate the performance of the simultaneous wireless information and power transfer (SWIPT) based cooperative cognitive radio networks (CCRNs). In particular, the outage probability is derived in the closed-form expressions under the opportunistic partial relay selection. Different from the conventional CRNs in which th...
Article
Mobility is a key aspect of modern networking systems. To determine how to better manage the available resources, many architectures aim to a priori know the future positions of mobile nodes. This can be determined, for example, from mobile sensors in a smart city environment or wearable devices carried by pedestrians. If we consider infrastructu...
Article
Full-text available
Nowadays, the demand for connection between the remote offices of a company, or between research locations, and constantly increasing work mobility (partly due to the current pandemic emergency) have grown hand in hand with the quality and speed of broadband connections. The logical consequence of this scenario is the increasingly widespread use of...
Article
Full-text available
Many studies in literature have shown that the bandwidth of an ongoing flow can dynamically change during multimedia sessions and an efficient bandwidth allocation scheme must be employed. This paper focuses its attention on the management of predictive services in Wireless Infrastructure Dynamic Networks. In particular, two classes of service are...
Article
Full-text available
We present the design for an ultra-low latency and low energy Internet of Things (IoT) network inspired by the emerging cooperative Non-Orthogonal Multiple Access (NOMA) wireless communication technique. The IoT network model consists of a source at the center of the network, a near device inside the network, and a far device outside the network. T...
Article
In this study, we examine an emerging Multiple-Input-Multiple-Output (MIMO) Non-Orthogonal Multiple Access (NOMA) network which combines Transmit Antenna Selection (TAS) and Simultaneous Wireless Information and Power Transfer (SWIPT) protocols. A pre-coding channels matrix was designed to aid the TAS protocol. We deployed a strong user as a relay...
Article
From many years, the methods to defend against Denial of Service attacks have been very attractive from different point of views, although network security is a large and very complex topic. Different techniques have been proposed and so-called packet marking and IP tracing procedures have especially demonstrated a good capacity to face different m...
Article
With the proliferation of connected vehicles, new coverage technologies and colossal bandwidth availability, the quality of service and experience in mobile computing play an important role for user satisfaction (in terms of comfort, security and overall performance). Unfortunately, in mobile environments, signal degradations very often affect the...
Article
Full-text available
In the last decade, the attention on unmanned aerial vehicles has rapidly grown, due to their ability to help in many human activities. Among their widespread benefits, one of the most important uses regards the possibility of distributing wireless connectivity to many users in a specific coverage area. In this study, we focus our attention on thes...
Article
Full-text available
Security performance and the impact of imperfect channel state information (CSI) in underlay cooperative cognitive networks (UCCN) is investigated in this paper. In the proposed scheme, relay R uses non-orthogonal multiple access (NOMA) technology to transfer messages e 1 , e 2 from the source node S to User 1 (U 1 ) and User 2 (U 2 ), respectively...
Article
Full-text available
In recent years, noticeable progress has been made in the development of quantum equipment, reflected through the number of successful demonstrations of Quantum Key Distribution (QKD) technology. Although they showcase the great achievements of QKD, many practical difficulties still need to be resolved. Inspired by the significant similarity betwee...
Article
Security in the context of Internet of Things (IoT) is a critical challenge. The purpose of this work is to model and evaluate a dynamic IoT security system based on a generic IoT edge network in which nodes exchange messages through the Message Queue Telemetry Transport (MQTT) protocol. This work aims to increase MQTT security by mitigating data t...
Conference Paper
A QoS routing to select the best paths among Drones supporting incoming calls and multimedia traffic in emergency or critical situations is proposed. In situations where drones' teams are requested to cover areas where mobile users can need to communicate under the absence of network infrastructure, a self-organized on-the fly network becomes an es...
Article
In the last years, vehicular networking has grown up in terms of interest and transmission capability, due to the possibility of exploiting the distributed communication paradigm in a mobile scenario, where moving nodes are represented by vehicles. The different existing standards for vehicular ad-hoc networks, such as DSRC, WAVE/IEEE802.11p, have...
Article
The paper proposes a bio-inspired coordination protocol for Unmanned Aerial Vehicles (UAVs) management in the agriculture domain. In precision agriculture the presence of parasites or the sudden climatic changes represent an important issue for farmers because of the degradation of crops and cultivation quality. Then, the use of the new technologie...
Article
Full-text available
When the connection to Internet is not available during networking activities, an opportunistic approach exploits the encounters between mobile human-carried devices for exchanging information. When users encounter each other, their handheld devices can communicate in a cooperative way, using the encounter opportunities for forwarding their message...
Preprint
Full-text available
In recent years, noticeable progress has been made in the development of quantum equipment, reflected through the number of successful demonstrations of Quantum Key Distribution (QKD) technology. Although they showcase the great achievements of QKD, many practical difficulties still need to be resolved. Inspired by the significant similarity betwee...
Article
Full-text available
Nowadays, the research on vehicular computing enhanced a very huge amount of services and protocols, aimed to vehicles security and comfort. The investigation of the IEEE802.11p, Wireless Access in Vehicular Environments (WAVE) and Dedicated Short Range Communication (DSRC) standards gave to the scientific world the chance to integrate new services...
Conference Paper
The strengthening of security solutions for computer networks increases the interests in new methods for the transfer of hidden information. In this paper, we considered the use of routing protocols for transmission of steganographic messages. We evaluated such approach using proactive and reactive routing protocols by analyzing the amount of sent...
Article
Full-text available
Recently, the interest of research is going to be focused on the emerging vehicular ad-hoc networks paradigm. In these networks, vehicles communicate with each other and have the possibility of exploiting a distributed approach, typical of ad-hoc networks, which allow mobile nodes (vehicles) to communicate with each other. Thanks to the different s...
Article
Nowadays, the interest in mobile communications is growing rapidly in a significant manner due to the high level of devices development, which permits the achievement of good objectives in terms of QoS for user satisfaction during active data flows. The increasing mobile client populations use different mobile devices to access the wireless medium...
Article
Given the recent computation technologies and dedicated systems able to analyze huge amounts of “real-world” data and to extract information from it, the application possibilities reached in wireless mobile systems have significantly increased. The availability of mobile information, directly extracted from mobility traces, can be used to enhance t...
Article
Full-text available
As research in quantum key distribution network technologies grows larger and more complex, the need for highly accurate and scalable simulation technologies becomes important to assess the practical feasibility and foresee difficulties in the practical implementation of theoretical achievements. In this paper, we described the design of simplified...
Article
In wireless networking the main desire of end-users is to take advantage of satisfactory services, in terms of QoS, especially when they pay for a required need. Many efforts have been made to investigate how the continuity of services can be guaranteed in QoS networks, where users can move from one cell to another one. The introduction of a predic...
Article
The employment of an appropriate Bandwidth Management Scheme (BMS) is needed in wireless networking, given that the main desire of end-users is to take advantage of satisfactory services, in terms of Quality of Service (QoS), especially when a particular charge is paid to meet the requirement. In this paper the authors are interested in investigati...
Conference Paper
In the last years the physical security in transportation systems is becoming a critical issue due to the high number of accidents and emergency situations. With the increasing availability of technological applications in vehicular environments researchers aimed at minimizing the probability of road accidents. In this paper, we propose a new platf...
Conference Paper
A mobile ad hoc network is a collection of mobile nodes which communicate without a fixed backbone or centralized infrastructure. Due to the frequent mobility of nodes, routes connecting two distant nodes may change. Therefore, it is not possible to establish a priori fixed paths for message delivery through the network. Because of its importance,...
Article
Full-text available
The article deals with a design of a system that provides tools for creation of automatically provisioned embedded communication system and its components. As the key feature of the BEESIP platform (Bright Efficient Embedded Solution for IP Telephony) a unique building and provisioning system of the network devices has been developed allowing the a...
Article
This work focuses on the return channel resource allocation in the DVB-RCS/RCS2 system for mobile terminals. A continuous carrier (CC) operation mode based on DVB-S2/S2X is considered and investigated. The paper focuses on the possibility of transmitting simultaneously in multifrequency???time division multiple access (MF-TDMA) or single channel pe...