Riccardo Bassoli

Riccardo Bassoli
Technische Universität Dresden | TUD · Institute of Communication Technology

Doctor of Philosophy

About

64
Publications
3,736
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
279
Citations
Additional affiliations
August 2019 - present
Technische Universität Dresden
Position
  • Senior Researcher
April 2016 - July 2019
Università degli Studi di Trento
Position
  • PhD Student
June 2011 - July 2015
Institute of Telecommunications
Position
  • Researcher
Education
October 2011 - November 2016
University of Surrey
Field of study
  • Electrical and Electronic Engineering

Publications

Publications (64)
Preprint
As space agencies are planning manned missions to reach Mars, researchers need to pave the way for supporting astronauts during their sojourn. This will also be achieved by providing broadband and low-latency connectivity through wireless network infrastructures. In such a framework, we propose a Martian deployment of a 3-Dimensional (3D) network a...
Article
Space Agencies from all over the world are planning human missions on the Red planet in the next 20–30 years. The landing of astronauts and their sojourn on the Martian surface will impose the presence in situ of some basic supporting infrastructures. Recent research by NASA highlighted the urgent necessity of providing efficient and readily-availa...
Article
Full-text available
The standardisation of 5G is reaching its end, and the networks have started being deployed. Thus, 6G architecture is under study and design, to define the characteristics and the guidelines for its standardisation. In parallel, communications based on quantum-mechanical principles, named quantum communications, are under design and standardisation...
Preprint
This paper comprehensively addresses homomorphic encryption from both theoretical and practical perspectives. The paper delves into the mathematical foundations required to understand fully homomorphic encryption FHE. It consequently covers design fundamentals and security properties of FHE, and describes the main FHE schemes based on various mathe...
Preprint
Data privacy concerns are increasing significantly in the context of Internet of Things, cloud services, edge computing, artificial intelligence applications, and other applications enabled by next-generation networks. Homomorphic Encryption addresses privacy challenges by enabling multiple operations to be performed on encrypted messages without d...
Preprint
This paper comprehensively addresses homomorphic encryption from both theoretical and practical perspectives. The paper delves into the mathematical foundations required to understand fully homomorphic encryption FHE. It consequently covers design fundamentals and security properties of FHE, and describes the main FHE schemes based on various mathe...
Conference Paper
Full-text available
An autonomic network management system (ANMS) is expected to play a significant role in fifth and sixth-generation (5G and 6G) networks. It enables the network to manage itself with minimum or no human intervention. Recently, an ANMS architecture called multi-agent-based network automation of the network management system (MANA-NMS) architecture wa...
Article
Full-text available
Software-defined networking decouples control and data plane in softwarized networks. This allows for centralized management of the network, but complete centralization of the controller functions raises potential issues related to failure, latency, and scalability. Distributed controller deployment is adopted to optimize scalability and latency pr...
Chapter
This chapter will discuss a framework for testing SDN-based services for 5G and beyond and will showcase how content distribution can be effectively implemented within an SDN cooperative-based ecosystem as a case study. The framework is engineered for testing cloud-based services in a virtual MSC (mobile small cell) environment. We showcase the tes...
Article
Ultra-dense Networks (UDNs) massively populate areas with base stations of diverse capabilities, thus increasing the network capacity. Moreover, the radio access network (RAN) architecture moves towards small infrastructure elements such as mobile small cells (MSCs). In this context, Network-coded Cooperation (NCC) leverages the interplay between n...
Preprint
Full-text available
We describe a method of investigating the near-term potential of quantum communication technology for communication networks from the perspective of current networks. For this, we integrate an instance of the quantum network simulator QuNetSim at the link layer into the communication network emulator ComNetsEmu. This novel augmented version of ComN...
Article
Full-text available
We describe a method of investigating the near-term potential of quantum communication technology for communication networks from the perspective of current networks. For this, we integrate an instance of the quantum network simulator QuNetSim at the link layer into the communication network emulator ComNetsEmu. This novel augmented version of ComN...
Article
Full-text available
The introduction of the Internet of Things (IoT) and massive machine-type communications has implied an increase in network size and complexity. In particular, there is already a huge number of IoT devices in the market in various sectors, such as smart agriculture, smart city, smart home, smart transportation, etc. The IoT interconnectivity techno...
Preprint
Full-text available
This article summarises the current status of classical communication networks and identifies some critical open research challenges that can only be solved by leveraging quantum technologies. By now, the main goal of quantum communication networks has been security. However, quantum networks can do more than just exchange secure keys or serve the...
Article
This article summarizes the current status of classical communication networks and identifies some critical open research challenges that can only be solved by leveraging quantum technologies. Until now, the main goal of quantum communication networks has been security. However, quantum networks can do more than just exchange secure keys or serve t...
Preprint
Full-text available
As 5th Generation research reaches the twilight, the research community must go beyond 5G and look towards the 2030 connectivity landscape, namely 6G. In this context, this work takes a step towards the 6G vision by proposing a next generation communication platform, which aims to extend the rigid coverage area of fixed deployment networks by consi...
Article
As 5th Generation research reaches the twilight, the research community must go beyond 5G and look towards the 2030 connectivity landscape, namely 6G. In this context, this work takes a step towards the 6G vision by proposing a next generation communication platform, which aims to extend the rigid coverage area of fixed deployment networks by consi...
Article
The advent of network softwarization is enabling multiple innovative solutions through software-defined networking (SDN) and network function virtualization (NFV). Specifically, network softwarization paves the way for autonomic and intelligent networking, which has gained popularity in the research community. Along with the arrival of 5G and beyon...
Article
Full-text available
Future generation networks will entirely deploy virtualization paradigms to enhance performance and capabilities of current cellular networks. In order to achieve the vision of fifth‐generation networks, software‐defined networking and network function virtualization will be applied not only at the core network but also at the radio access network....
Chapter
In this chapter, we introduce the concept of network function virtualization. Initially, we describe the virtualization of network functions from a theoretical point of view and discuss the reasons of its invention and the importance of its investigation. Next, we describe the architecture of network function virtualization providing detailed insig...
Chapter
Introducing computation within communication networks requires the definition of proper reference architectures and standard protocols to enable interoperability and ease of integration. In this chapter, we introduce the concept, meaning, and impact of standardization on technology, with a special focus on telecommunications networks. Moreover, we...
Chapter
Active error correction is necessary to counter the effect of noise. Classical error correction is generally used to protect transmission and storage of data, because in these conditions noise has had a chance to accumulate over space or time. Otherwise, there is no active error correction in computation because the signal levels are extremely high...
Chapter
From the very beginning and still today, telecommunications theory has relied on classical physics and rules of classical systems. However, telecommunications actually obeys the more general postulates and laws of quantum mechanics. In order to fully understand the advantage quantum mechanics provides to telecommunications, it is important to start...
Chapter
The present chapter introduces the mathematical modeling of quantum communication systems in the spirit of Shannon’s conception of information theory. Regarding the choice of topics treated as well as the methodological approach pursued, one can draw analogies with the material covered in standard classical information theory modules, which are int...
Book
This book provides a tutorial on quantum communication networks. The authors discuss current paradigm shifts in communication networks that are needed to add computing and storage to the simple transport ideas of prevailing networks. They show how these ‘softwarized’ solutions break new grounds to reduce latency and increase resilience. The authors...
Chapter
The reason behind developing quantum computing is not only related to achieving higher computing capacity but also to be able to properly simulate and numerically study quantum systems. It is still not clear what all the computational tasks for quantum networking are and which of them need to be or are preferably solved with a quantum computer. The...
Chapter
After having described specific areas of research of applied quantum mechanics such as quantum information theory, quantum error correction, and quantum computing, this chapter leverages those results and contextualizes them in the wider perspective of quantum communication networks. Such networks require the deployment of the so-called quantum rep...
Chapter
This chapter ends the book with final considerations on quantum communication networks, underlining how they can exceed classical telecommunications. Moreover, practical use cases of quantum communication networks (with their latest results) are surveyed, such as the quantum Internet of Things and quantum distributed synchronization.
Article
Full-text available
Fast on-demand 5G connectivity can be deployed through the usage of aerial platforms. Indeed, the usage of moving nodes represents at the moment the most interesting and cost-affordable way to bring connectivity and network services in emergency scenarios or in the absence of the network infrastructure. This article presents an architecture for usi...
Article
5G and beyond need to meet stringent requirements of latency, reliability, and support for heterogeneous devices. However, the existing wireless network architecture is limited to fulfill these constraints. Cloud radio access network, along with network function virtualization, is suggested to provide flexibility and network agility. It decouples n...
Article
5G networks are expected to become the main infrastructure for security verticals such as disaster relief, humanitarian aid, and governmental and defense communications. In the case of defense services, especially, there are complex areas where coverage and connectivity are not reliable or are completely absent. Thus, the deployment of drones as mo...
Chapter
Nowadays, communication technologies are breaking the boundaries of common wireless and wired channels towards innovative areas, aiming to go beyond traditional mediums to novel channels to extend the opportunities and increase the range of communicating devices. In this framework, nano-scale and molecular communications represent an interesting su...
Article
Future networks are expected to provide improved support for several different kinds of applications and services. All these services will have diverse characteristics and requirements to be satisfied. A potential technology to upgrade efficiently and effectively current generation networks is virtualisation via network ’softwarization’. This appro...
Article
The effort of telecommunications operators in 5G design and implementation is oriented to effective and efficient verticals support. Full network softwarization will deploy tools such as software-defined networks and network functions virtualization to allow dynamic service provisioning on the same physical infrastructure. However, current 5G propo...
Article
Full-text available
Achieving the low-latency constraints of public safety applications during disaster could be life-saving. In the context of public safety scenarios, in this paper, we propose an efficient radio resource slicing algorithm that enables first responders to deliver their life-saving activities effectively. We used the tool of stochastic geometry to mod...
Article
Novel authentication procedures for interworking wireless local area networks and evolved packet system are proposed for the 3GPP TS 33.402 (released 12 September 2014) standard. The novel solutions mainly exploit public-key fully homomorphic encryption schemes and one-way functions. This not only mitigates potential security threats, but significa...
Article
Information paths in current communication networks can often be modelled by set of serial links interconnected by intermediate nodes. These kind of scenarios are called line networks. If the links between nodes experience connection problems, burst erasures of information can happen. In this article, hybrid serial concatenated network codes are pr...
Conference Paper
In wireless networks, mobile users connect either with other devices or with base stations. They can experience high errors caused by losses, low levels of signals or disconnections. Due to these aspects, it is important to find ways to make the communication reliable. Product network codes represent a way to improve error-correction capability. Th...
Article
This survey paper shows the state of the art in security mechanisms, where a deep review of the current research and the status of this topic is carried out. We start by introducing network coding and its variety of applications in enhancing current traditional networks. In particular, we analyze two key protocol types, namely, state-aware and stat...
Chapter
Presently, a large proportion of the Internet traffic is multimedia streaming. Moreover, there has been a vast proliferation of multimedia-capable mobile devices equipped with multiple radio interfaces. In particular, it is foreseen that by 2016 video streaming will account close to 70 % of consumer mobile traffic. A major challenge for the future...
Conference Paper
The diffusion of mobile devices, that are capable to play videos, opened new challenges for video streaming applications. Since wireless communications are prone to erasures, an important goal is to research possible ways to reliably provide video content. Fountain codes are an efficient way to protect video streaming against erasures: in particula...
Conference Paper
This paper studies the performance of network coding (NC) based system, especially looking at the implications in surveillance applications. We argue that NC can provide advantages from a data throughput perspective; however, an analysis of NC mechanism, especially when there are erroneous channels in the network, is required. We study the performa...
Conference Paper
Managing and maintaining network connectivity in a mobile ad-hoc network (MANET) is known to consume bandwidth and energy at the mobile nodes. Traditional mechanisms require that stations periodically monitor the wireless channel, in order to determine available paths to route incoming packets. Aiming to alleviate the problem of energy consumption...
Conference Paper
In future mobile networks different technologies will coexist and wireless devices with multiple interfaces will move in a heterogeneous scenario. The capability to connect to different access radio technologies opens the way to vertical handover mechanisms. Then, allowing vertical handovers with low losses and costs will be a main requirement of f...
Article
This article surveys all known fields of network coding theory and leads the reader through the antecedents of the network coding theory to the most recent results, considering also information theory and matroid theory. By focusing on providing ideas and not formulas, this survey is both fitted for the taste of readers who are mathematically orien...
Conference Paper
Wireless networks are evolving into a unique heterogeneous scenario. Moreover, mobile terminals with multiple wireless interfaces have the ability to roam between different access networks. Allowing seamless and efficient vertical handoffs is becoming a key requirement for future wireless environments. We discuss the application of recent kind of n...

Network

Cited By

Projects

Project (1)