Pietro Tedeschi

Pietro Tedeschi
Technology Innovation Institute (TII) | TII · Secure Systems Research Centre

Ph.D. in Computer Science and Engineering
Senior Security Researcher @ Technology Innovation Institute, Abu Dhabi, UAE

About

31
Publications
13,615
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
173
Citations
Introduction
Pietro is Senior Security Researcher at Technology Innovation Institute, Abu Dhabi. He holds a Ph.D. in Computer Science and Engineering at the HBKU, Doha, Qatar in 2021, a BSc. in Computer and Automation Engineering in 2014, and a MSc. (with honors) in Computer Engineering both from the “Politecnico di Bari”, in 2017. His major research interests include security issues in UAV/Drone security and privacy, Wireless security, Internet of Things, and Cyber-Physical Systems Security.
Additional affiliations
January 2022 - February 2022
Technology Innovation Institute (TII)
Position
  • Senior Security Researcher
September 2018 - December 2021
Hamad bin Khalifa University
Position
  • PhD Student
Description
  • Active member of the HBKU Cyber-Security Research Innovation Lab, led by Prof. Roberto Di Pietro. His research focus on: UAV/Drone Security, Wireless Security (Jamming and Anti-Jamming Techniques), IoT, Applied Cryptography, Computer Security.
March 2017 - August 2018
Consorzio Nazionale Interuniversitario per le Telecomunicazioni
Position
  • Researcher
Description
  • Researcher in Computer and Network Security, and Privacy. Projects: EU Horizon 2020 symbIoTe. Thesis Advisor on more than 10 thesis’ works, Network Security Lab Teaching Assistant, Penetration Testing Seminar, IoT Teaching Assistant.
Education
October 2014 - February 2017
Politecnico di Bari
Field of study
  • Computer Science Engineering
September 2010 - September 2014
Politecnico di Bari
Field of study
  • Computer Science and Automation Engineering

Publications

Publications (31)
Article
Full-text available
Current collision avoidance techniques deployed on Unmanned Aerial Vehicles (UAVs) rely on short-range sensors, such as proximity sensors, cameras, and microphones. Unfortunately, their efficiency is significantly limited in several situations; for instance, when a remote UAV approaches at high velocity, or when the surrounding environment is impai...
Article
Full-text available
Jamming is a malicious radio activity that represents a dreadful threat when employed in critical scenarios. Several techniques have been proposed to detect, locate, and mitigate jamming. Similarly, counter-counter-jamming techniques have been devised. This paper belongs to the latter thread. In particular, we propose a new jammer model: a power-mo...
Preprint
Full-text available
Satellite-based Communication (SATCOM) systems are gaining renewed momentum in Industry and Academia, thanks to innovative services introduced by leading tech companies and the promising impact they can deliver towards the global connectivity objective tackled by early 6G initiatives. On the one hand, the emergence of new manufacturing processes an...
Conference Paper
Full-text available
To enable enhanced accountability of Unmanned Aerial Vehicles (UAVs) operations, the US-based Federal Avionics Administration (FAA) recently published a new dedicated regulation, namely RemoteID, requiring UAV operators to broadcast messages reporting their identity and location. The enforcement of such a rule, mandatory by 2022, generated signific...
Article
Water pollution is a critical issue that affects the entire ecosystem, with non-negligible consequences on humans’ health, thus inducing economic and social concerns. This paper focuses on an Internet of Things water quality prediction system, namely WaterS, that remotely communicates gathered measurements leveraging the Sigfox communication techno...
Preprint
Full-text available
Contact tracing with mobile applications is an attractive approach for many governments and industry initiatives to address the Covid-19 pandemic. However, many approaches today have severe privacy and security issues, and many of them also fail to offer a sustainable contact tracing infrastructure due to the demanding energy consumption. This work...
Article
Full-text available
Contact tracing is the techno-choice of reference to address the COVID-19 pandemic. Many of the current approaches have severe privacy and security issues and fail to offer a sustainable contact tracing infrastructure. We address these issues introducing an innovative, privacy-preserving, sustainable, and experimentally tested architecture that lev...
Conference Paper
Full-text available
Traditional studies on jamming effectiveness and propagation over the wireless channel assume ideal theoretical models, such as Friis and Rician. However, the cited models have been hardly validated by on-field assessments in real jamming scenarios. To the best of our knowledge, we are the first ones to fill the highlighted gap. In particular, our...
Conference Paper
Full-text available
Energy depletion attacks represent a challenging threat towards the secure and reliable deployment of low-power Internet of Things (IoT) networks. Indeed, by simply transmitting canning standard-compliant packets to a target IoT device, an adversary can quickly exhaust target devices' available energy and reduce network lifetime, leading to extensi...
Article
Full-text available
Automatic Identification System (AIS) is the de-facto communication standard used by vessels to broadcast identification and position information. However, being AIS communications neither encrypted nor authenticated, they can be eavesdropped and spoofed by adversaries, leading to potentially threatening scenarios. In this paper, we propose Auth-AI...
Preprint
Full-text available
Contact tracing via mobile applications is gaining significant traction in the battle against Covid-19. A plethora of contact tracing apps have been developed and deployed in several countries around the world. However, people are rightfully concerned about the security and privacy risks of such applications. To this end, the contribution of this w...
Article
Full-text available
The recent advancements in hardware miniaturization capabilities have boosted the diffusion of systems based on Energy Harvesting (EH) technologies, as a means to power embedded wireless devices in a sustainable and low-cost fashion. Despite the undeniable management advantages, the intermittent availability of the energy source and the limited pow...
Preprint
Full-text available
Water pollution is a critical issue that can affects humans' health and the entire ecosystem thus inducing economical and social concerns. In this paper, we focus on an Internet of Things water quality prediction system, namely WaterS, that can remotely communicate the gathered measurements leveraging Low-Power Wide Area Network technologies. The s...
Preprint
Full-text available
Contact tracing promises to help fight the spread of COVID–19 via an early detection of possible contagion events. To this end, most existing solutions share the following architecture: smartphones continuously broadcast random beacons that are intercepted by nearby devices and stored into their local contact logs. In this article, we propose an Io...
Conference Paper
Full-text available
Modern vessels increasingly rely on the Automatic Identification System (AIS) digital technology to wirelessly broadcast identification and position information to neighboring vessels and ports. AIS is a time-slotted protocol that also provides unicast messages-usually employed to manage self-separation and to exchange safety information. However,...
Preprint
Full-text available
Vessels cybersecurity is recently gaining momentum, as a result of a few recent attacks to vessels at sea. These recent attacks have shacked the maritime domain, which was thought to be relatively immune to cyber threats. The cited belief is now over, as proved by recent mandates issued by the International Maritime Organization (IMO). According to...
Article
Full-text available
Vessels cybersecurity is gaining momentum as a result of a few recent attacks on vessels at sea. These recent attacks have shocked the maritime domain, which was thought to be relatively immune to cyber threats. That belief is now over, as proved by recent mandates issued by the International Maritime Organization. According to these regulations, a...
Preprint
Full-text available
The recent advancements in hardware miniaturization capabilities have boosted the diffusion of systems based on Energy Harvesting (EH) technologies, as a means to power embedded wireless devices in a sustainable and low-cost fashion. Despite the undeniable management advantages, the intermittent availability of the energy source and the limited pow...
Article
Full-text available
We propose JAM-ME, an autonomous jamming-assisted navigation system that allows a drone to accomplish its mission even in the presence of an anti-drone jamming protection system. In this contribution, we review the current state-of-the-art highlighting how current solutions to respond to drones are completely ineffective against JAM-ME. In particul...
Article
Full-text available
Certificateless Public Key Cryptography (CL-PKC) schemes are particularly robust against the leakage of secret information stored on a Trusted Third Party (TTP). These security features are particularly relevant for Internet of Things (IoT) domains, where the devices are typically pre-configured with secret keys, usually stored locally on the TTP f...
Conference Paper
Full-text available
The increasing integration of information and communication technologies has undoubtedly boosted the efficiency of Critical Infrastructures (CI). However, the first wave of IoT devices, together with the management of enormous amount of data generated by modern CIs, has created serious architectural issues. While the emerging Fog and Multi-Access E...
Conference Paper
Full-text available
In this paper, we show, for the first time in the literature, that the common assumption that jamming is an effective way to neutralise drones, is false. In particular, we propose JAM-ME a solution that allows the drone to exploit an adversarial jamming signal to implement an emergency but yet effective navigation system, enabling the drone to acco...
Conference Paper
Full-text available
Conventional Key Management Protocols establish secure communication channels by using asymmetric cryptography based on “fixed“ public keys. In the Internet of Things context, it is preferable to have a good level of freshness of the cryptographic material. But efficient solutions leveraging “ephemeral“ public keys are not available yet. The work p...
Conference Paper
Full-text available
The Internet of Things (IoT) today is a large set of technologies and platforms for sensor and actuation applications in smart-health, transportation, metering, city and building management, etc. Most of these IoT platforms are designed as isolated systems and are distributed across the composite space of devices, interconnected with complex contro...
Article
Full-text available
The IoT represents the enabling paradigm of a huge number of smart applications, spanning from short‐range communications to LPWAN. Among them, environmental monitoring becomes more and more challenging as the area of interest is difficult to reach. The present contribution proposes WaterS, an open source project that relies on low‐cost and rapid‐p...
Article
Full-text available
Blockchain is emerging as a promising technology able to support transparent, secure, and immutable transactions traceability in decentralized networks. Its usage in many application domains, including the Internet of Things, is gaining the attention of even more researchers and industries worldwide. In line with current research interests, the wor...
Conference Paper
Full-text available
Current activities in the Internet of Things research area are devoting many efforts to the definition of architectures and mechanisms supporting the federation of heterogeneous platforms. In this context, the Multi-Domain Access Rights Composition is emerging as a promising paradigm, enabling the sharing of resources across organizations and bound...

Network

Cited By

Projects

Projects (4)
Project
Vessels cybersecurity is recently gaining momentum, as a result of a few recent attacks to vessels at sea. These recent attacks have shacked the maritime domain, which was thought to be relatively immune to cyber threats. The cited belief is now over, as proved by recent mandates issued by the International Maritime Organization (IMO). According to these regulations, all vessels should be the subject of a cybersecurity risk analysis, and technical controls should be adopted to mitigate the resulting risks. This initiative is laudable since, despite the recent incidents, the vulnerabilities and threats affecting modern vessels are still unclear to operating entities, leaving the potential for dreadful consequences of further attacks just a matter of “when”, not “if”. The CRI-Lab is committed to provide solutions into the maritime cybersecurity domain that blend sound research results with practical applications.
Project
Cybersecurity analysis in the new Edge/Fog network paradigms
Project
This project would aim at developing new tools and techniques to counter the security threats to a range of communication protocols in future communication networks including, but not limited to, Internet of Things (IoT), Vehicular Networks (VANET) and Cellular Infrastructures.