Sabrina SicariUniversità degli Studi dell'Insubria | UNINSUBRIA · Department of Theoretical and Applied Sciences
Sabrina Sicari
Associate Professor Ph.d
About
89
Publications
89,187
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
7,933
Citations
Introduction
Skills and Expertise
Additional affiliations
April 2006 - present
September 2004 - March 2006
Education
January 2003 - March 2006
October 1996 - July 2002
Publications
Publications (89)
Open Position for Research at the University of Insubria (Varese - Italy). More information at: https://www.uninsubria.it/bandi-e-concorsi/assegno-di-ricerca-dipartimentale-serena-architettura-di-rete-sicura-e-affidabile English version: https://www.uninsubria.eu/opportunity/departmental-research-grant-serena-secure-and-reliabile-network-architectu...
The incremental diffusion of the Internet of Things (IoT) technologies and applications represents the outcome of a world ever more connected by means of heterogeneous and mobile devices. IoT scenarios imply the presence of multiple data producers (e.g., sensors, actuators, RFID, NFC) and consumers (e.g., end-user devices, such as smartphones, tabl...
The Internet of Things (IoT) paradigm is characterized by the adoption of different protocols and standards to enable communications among heterogeneous and, often, resource-constrained devices. The risk of violation is high due to the wireless nature of the communication protocols usually involved in the IoT environments (e.g., e-health, smart agr...
Security and privacy of information transmitted among the devices involved in an Internet of Things (IoT) network represent relevant issues in IoT contexts. Guaranteeing effective control and supervising access permissions to IoT applications is a complex task, mainly due to resources' heterogeneity and scalability requirements. The design and deve...
Organizing the storing of information and data retrieval from databases is a crucial issue, which has become more critical with the spreading of cloud and Internet of Things (IoT) based applications. In fact, not only the network’s traffic has increased, but also the amount of memory and the mechanisms needed to manage the so-called Big Data effici...
Patients’ remote monitoring becomes even more crucial due to the spreading of the COVID-19 disease. Hospitals cannot accommodate all the patients who need to be taken care. Hence, tele-medicine or, as also named, tele-health, remains the only means available to keep the situation under control. In particular, it is important to monitor the patients...
Regulating the access to the Internet of Things (IoT) network’s resources is a complex-prone task, which requires to pay a great attention on how policies are defined, shared, and enforced. The present paper considers the specific context of a smart home, which represents one of the main IoT application domains, and it focuses on two solutions prop...
Nowadays, the capability of rapidly designing and prototyping, simple, yet real domotics systems (e.g., smart homes and smart buildings applications) is even more compelling, due to the availability and increasing spread of Internet of Things (IoT) devices. Home automation services enable the remote monitoring of indoor environments and facilities....
The continuous spreading of innovative applications and services, based on the emerging Internet of Things (IoT) paradigm, leads to the need of even more efficient network architectures/infrastructures, in order to support the huge amount of information to be transmitted in real-time. Hence, new protocols and mechanisms must be conceived to allow t...
People are increasingly surrounded by a connected world, where they can gather and share information everywhere, at anytime, and by means of a variety of devices, belonging to the so-called Internet of Things (IoT) network. IoT technologies and applications are spreading in different scenarios, ranging from everyday life activities to business ones...
Now reaching 2020, the world is witnessing the initial diffusion of 5G networks, which promise to revolutionize the mobile wireless communications, providing faster services, very low delays, and a very pervasive connectivity via mobile devices. It is worth to remark that the main paradigm which will take advantage from 5G is really the Internet of...
The growing diffusion of the technologies related to the Internet of Things (IoT) paradigm not only facilitates the connectivity among a huge amount of different devices, but also the variety of applications and services which can be provided to users. Everyday objects, equipped with the technologies involved in such a paradigm, become smart and ar...
In the digital age, where the Internet connects things across the globe and individuals are constantly online, data security and privacy are becoming key drivers (and barriers) of change for adoption of innovative solutions. Traditional approaches, whereby communication links are secured by means of encryption, and access control is run in a static...
The paper proposes the use of Node-RED, a flow-based programming tool targeted to Internet of Things (IoT), along with a series of case studies related to different IoT contexts, which demonstrate Node-RED's potentialities and outcomings towards the realization of well-structured IoT environments. The analyzed applications potentially include a wid...
During the last years, the interest in nano-technologies and nanoscale communications significantly growth in several application domains, such as healthcare, bio-medicine, agro-food, industry, and military/defense. Nano-scale devices are able to interact with each others, with existing communication networks and, ultimately, with the Internet. As...
A clever and efficient management of transport and logistics are fundamental in manufacturer companies, starting to adopt new methodologies, inspired to the emerging industry 4.0 principles. Such a behavior is influenced by the spreading of the Internet of Things (IoT) paradigm, helping to automate a lot of features, if not all, of products’ manage...
Letting both data producers and data consumers be aware of the levels of security and privacy guaranteed within an IoT-based system represents an important goal to be pursued. In fact, the presence of multiple and heterogeneous data sources, as well as wireless communication standards, increases the risk of violation in IoT scenarios. Besides contr...
Denial of Service (DoS) attack represents until now a relevant problem in Internet-based contexts. In fact, it is both difficult to recognize and to counteract. Along with the adoption and diffusion of Internet of Things (IoT) applications, such an issue has become more urgent to solve, due to the presence of heterogeneous data sources and to the w...
Both people and organization are widely accepting and adopting the functionalities offered by the smart home or smart building applications. This is due to the many advantages, in easing users’ every-day life and work, provided by the emerging Internet of Things (IoT) technologies and devices, equipped with sensors, cameras, or actuators, and able...
The diffusion of Internet of Things (IoT) technologies enables the provision of advanced and valuable services, but also raises several challenges. First of all, the increasing number of heterogeneous interconnected devices creates scalability and interoperability issues and thus a flexible middleware platform is needed to manage all the sources to...
Many solutions based on machine learning techniques have been proposed in literature aimed at detecting and promptly counteracting various kinds of malicious attack (data violation, clone, sybil, neglet, greed, DoS attacks), which frequently affect Wireless Sensor Networks (WSN). Besides recognizing the corrupted or violated information, also the a...
Security and privacy represent critical issues for a wide adoption of IoT technologies both by industries and people in their every-day life. Besides, the complexity of an IoT system’s management resides in the presence of heterogeneous devices, which communicate by means of different protocols and provide information belonging to various applicati...
One of the hottest topics in the Internet of Things (IoT) domain relates to the ability of enabling computation and storage at the edges of the network. This is becoming a key feature in order to ensure the ability of managing in a scalable way service requests with low response times. This means being able to acquire, store, and process IoT-genera...
Internet of Things (IoT) is characterized by heterogeneous technologies, which concur to the provisioning of innovative services in different application domains. Introducing efficient mechanisms for collecting, processing, and delivering data generated by sensors, medical equipment, wearable devices, and humans, is a key enabling factor for advanc...
Internet of Things (IoT) is characterized by heterogeneous technologies, which concur to the provisioning of innovative services in different application domains. Introducing efficient mechanisms for collecting, processing, and delivering data generated by sensors, medical equipment, wearable devices, and humans, is a key enabling factor for advanc...
Security, interoperability, scalability, and mobility support are key challenges for the Internet of Things (IoT). Information Centric Networking (ICN) is an emerging paradigm for the Future Internet design that brings all the potential to face these challenges thanks to name-driven networking primitives. As a matter of fact, ICN natively supports...
Security threats may hinder the large scale adoption of the emerging Internet of Things (IoT) technologies. Besides efforts have already been made in the direction of data integrity preservation, confidentiality and privacy, several issues are still open. The existing solutions are mainly based on encryption techniques, but no attention is actually...
Thanks to the availability of miniaturized camera and microphones, nowadays Wireless Multimedia Sensor Networks (WMSNs) can sense and deliver audio/video signals from a target environment to remote analysis sites. Hence, new opportunity are disclosed for advanced applications in health care, surveillance, military, and traffic monitoring domains, t...
The continuous interest in Wireless Sensor Networks (WSN) has led to the development of several applications, from traditional monitoring, to cooperative and distributed control and management systems, to automated industrial machinery and logistics. The design and optimization of specialized WSN platforms and communication protocols typically reli...
Over recent years, the continuous interest in wireless sensor networks (WSNs) has led to the appearance of new modeling methods and simulation environments for WSN applications. A broad variety of different simulation tools have been designed to explore and validate WSN systems before actual implementation and real-world deployment. These tools add...
The increasing diffusion of services enabled by Internet of Things (IoT) technologies raises several risks associated to security and data quality. Together with the high number of heterogeneous interconnected devices, this creates scalability issues, thereby calling for a flexible middleware platform able to deal with both security threats and dat...
The satisfaction of security and data quality requirements plays a fundamental role in the Internet of Things (IoT) scenario. Such a dynamic environment requires the adoption of heterogeneous technologies to provide customized services in various application domains and both security threats and data quality issues need to be addresses in order to...
Internet of Things (IoT) is characterized, at the system level, by high diversity with respect to enabling technologies and supported services. IoT also assumes to deal with a huge amount of heterogeneous data generated by devices, transmitted by the underpinning infrastructure and processed to support value-added services. In order to provide user...
Internet of Things (IoT) involves heterogeneous technologies (i.e., WSN, RFID, actuators) able to exchange data acquired from the environment in order to provide services to the requesting users. In such a scenario the privacy and the quality (i.e., in terms of accuracy, timeliness, completeness) of the handled information represent critical issues...
The ongoing revolution of Internet of Things (IoT), together with the growing diffusion of robots in many activities of every day life, makes IoT-aided robotics applications a tangible reality of our upcoming future. Accordingly, new advanced services, based on the interplay between robots and “things”, are being conceived in assisting humans. Neve...
Most applications of wireless sensor networks (WSNs) rely on data about the positions of sensor nodes, which are not necessarily known beforehand. Several localization approaches have been proposed but most of them omit to consider that WSNs could be deployed in adversarial settings, where hostile nodes under the control of an attacker coexist with...
Secure data aggregation still represents a very
challenging topic in wireless sensor networks’ research. In fact,
only few solutions exists to face, simultaneously, confidentiality,
integrity, adaptive aggregation, and privacy issues. Furthermore,
proposals available in literature mainly assume flat network
architectures, without leveraging the pec...
Typical wireless sensor networks (WSNs) applications are characterized by a certain number of different requirements such as: data accuracy, localization, reputation, security, and confidentiality. Moreover, being often battery powered, WSNs face the challenge of ensuring privacy and security despite power consumption limitations. When the applicat...
Wireless sensor networks (WSNs) in which the location of sensors is a key information are becoming more and more important. Moreover, in many cases privacy is a key issues for such network which can be the target of different kind of security attacks. In this paper we present an approach, named Cross Layer Protocol (CLP), for improving data quality...
The term “Internet-of-Things” is used as an umbrella keyword for covering various aspects related to the extension of the Internet and the Web into the physical realm, by means of the widespread deployment of spatially distributed devices with embedded identification, sensing and/or actuation capabilities. Internet-of-Things envisions a future in w...
End-to-end data aggregation, without degrading sensing accuracy, is a very relevant issue in wireless sensor networks (WSN) that can prevent network congestion to occur. Moreover, privacy management requires that anonymity and data integrity are preserved in such networks. Unfortunately, no integrated solutions have been proposed so far, able to ta...
This paper describes the work done in the project MoseForAgrofood (Ms4A) whose goal is to take advantage of mobile technologies to develop augmented Web services for the agrofood domain. The use of personal devices, such as smart phones and tablets, brings in specific issues such as the need to consider quality of protection, quality of services, q...
Wireless sensor networks (WSN) are the target of different kinds of security attacks. The network nodes, which sense, aggregate, encrypt and transmit data, play a key role for assuring data quality. In this paper we present a way in which the network sink can evaluate the nodes reputation in order to determine whether one or more nodes are behaving...
Wireless Sensor Networks (WSNs) provide an extensible and effective means to monitor large and geographically diverse areas. Nodes in a WSN are characterized by very strict constraints in terms of computing power and energy consumption, as a result of which efficient and secure data aggregation techniques are being proposed as enabling technology f...
Robust image and video communications have become more imperative due to the ubiquitous proliferation of multimedia applications over wireless sensor networks. In this work, the transmission distortions on the image data induced by both channel and instant ...
Enterprises have adopted various strategies to protect customers’ privacy and to make public their policies. This chapter presents a conceptual model for supporting the definition of privacy policies. The model, described by means of UML, introduces a set of concepts concerning privacy and defines the existent relationships among those concepts alo...
Wireless Sensor Networks (WSNs) support data collection and distributed data processing by means of very small sensing devices
that are easy to tamper and clone: therefore classical security solutions based on access control and strong authentication
are difficult to deploy. In this paper we look at the problem of assessing the reliability of node...
Wireless Sensor Networks (WSN) support data collection and distributed data processing by means of very small sensing devices that are easy to tamper and cloning: therefore classical security solutions based on access control and strong authentication are difficult to deploy. In this paper we look at the problem of assessing security of node locali...
Wireless Sensor Networks (WSN) support data collection and distributed data processing by means of very small sensing devices that are easy to tamper and cloning: therefore classical security solutions based on access control and strong authentication are difficult to deploy. In this paper we look at the problem of assessing security of node locali...
Risk assessment is a well-established engineering practise widely applied on technological systems. Despite its spread, few attempts have been made to formalise its basis in order to provide a non-empirical foundation. In this article we introduce a formal analysis of risk assessment in an algebraic framework, considering also the case of multiple...
Nowadays Wireless Sensor Networks (WSN) are used in many application contexts. Data handled by WSN are required to be protected for privacy reasons since they can be directly or indirectly related to individuals. The problem of preventing the identification of individuals starting from their data, known as anonymity, is a fundamental requirement fo...
Wireless Sensor Networks are characterized by very tight energy requirements and therefore they impose strict constraints on the amount of data that can be transmitted by sensors nodes. In order to achieve such a goal many data aggregation algorithm have been defined. However, in order to ensure a broad deployment of the innovative services deliver...