Sabrina Sicari

Sabrina Sicari
Università degli Studi dell'Insubria | UNINSUBRIA · Department of Theoretical and Applied Sciences

Associate Professor Ph.d

About

89
Publications
89,187
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
7,933
Citations
Introduction
Additional affiliations
April 2006 - present
September 2004 - March 2006
Politecnico di Milano
Position
  • Università degli studi di Milano
Education
January 2003 - March 2006
University of Catania
Field of study
  • Computer science and telecommunication Engineering
October 1996 - July 2002
University of Catania
Field of study
  • Engineering

Publications

Publications (89)
Research Proposal
Open Position for Research at the University of Insubria (Varese - Italy). More information at: https://www.uninsubria.it/bandi-e-concorsi/assegno-di-ricerca-dipartimentale-serena-architettura-di-rete-sicura-e-affidabile English version: https://www.uninsubria.eu/opportunity/departmental-research-grant-serena-secure-and-reliabile-network-architectu...
Article
The incremental diffusion of the Internet of Things (IoT) technologies and applications represents the outcome of a world ever more connected by means of heterogeneous and mobile devices. IoT scenarios imply the presence of multiple data producers (e.g., sensors, actuators, RFID, NFC) and consumers (e.g., end-user devices, such as smartphones, tabl...
Article
Full-text available
The Internet of Things (IoT) paradigm is characterized by the adoption of different protocols and standards to enable communications among heterogeneous and, often, resource-constrained devices. The risk of violation is high due to the wireless nature of the communication protocols usually involved in the IoT environments (e.g., e-health, smart agr...
Article
Full-text available
Security and privacy of information transmitted among the devices involved in an Internet of Things (IoT) network represent relevant issues in IoT contexts. Guaranteeing effective control and supervising access permissions to IoT applications is a complex task, mainly due to resources' heterogeneity and scalability requirements. The design and deve...
Article
Full-text available
Organizing the storing of information and data retrieval from databases is a crucial issue, which has become more critical with the spreading of cloud and Internet of Things (IoT) based applications. In fact, not only the network’s traffic has increased, but also the amount of memory and the mechanisms needed to manage the so-called Big Data effici...
Article
Full-text available
Patients’ remote monitoring becomes even more crucial due to the spreading of the COVID-19 disease. Hospitals cannot accommodate all the patients who need to be taken care. Hence, tele-medicine or, as also named, tele-health, remains the only means available to keep the situation under control. In particular, it is important to monitor the patients...
Article
Full-text available
Regulating the access to the Internet of Things (IoT) network’s resources is a complex-prone task, which requires to pay a great attention on how policies are defined, shared, and enforced. The present paper considers the specific context of a smart home, which represents one of the main IoT application domains, and it focuses on two solutions prop...
Article
Full-text available
Nowadays, the capability of rapidly designing and prototyping, simple, yet real domotics systems (e.g., smart homes and smart buildings applications) is even more compelling, due to the availability and increasing spread of Internet of Things (IoT) devices. Home automation services enable the remote monitoring of indoor environments and facilities....
Chapter
Full-text available
The continuous spreading of innovative applications and services, based on the emerging Internet of Things (IoT) paradigm, leads to the need of even more efficient network architectures/infrastructures, in order to support the huge amount of information to be transmitted in real-time. Hence, new protocols and mechanisms must be conceived to allow t...
Conference Paper
Full-text available
People are increasingly surrounded by a connected world, where they can gather and share information everywhere, at anytime, and by means of a variety of devices, belonging to the so-called Internet of Things (IoT) network. IoT technologies and applications are spreading in different scenarios, ranging from everyday life activities to business ones...
Article
Full-text available
Now reaching 2020, the world is witnessing the initial diffusion of 5G networks, which promise to revolutionize the mobile wireless communications, providing faster services, very low delays, and a very pervasive connectivity via mobile devices. It is worth to remark that the main paradigm which will take advantage from 5G is really the Internet of...
Article
Full-text available
The growing diffusion of the technologies related to the Internet of Things (IoT) paradigm not only facilitates the connectivity among a huge amount of different devices, but also the variety of applications and services which can be provided to users. Everyday objects, equipped with the technologies involved in such a paradigm, become smart and ar...
Article
Full-text available
In the digital age, where the Internet connects things across the globe and individuals are constantly online, data security and privacy are becoming key drivers (and barriers) of change for adoption of innovative solutions. Traditional approaches, whereby communication links are secured by means of encryption, and access control is run in a static...
Article
Full-text available
The paper proposes the use of Node-RED, a flow-based programming tool targeted to Internet of Things (IoT), along with a series of case studies related to different IoT contexts, which demonstrate Node-RED's potentialities and outcomings towards the realization of well-structured IoT environments. The analyzed applications potentially include a wid...
Article
Full-text available
During the last years, the interest in nano-technologies and nanoscale communications significantly growth in several application domains, such as healthcare, bio-medicine, agro-food, industry, and military/defense. Nano-scale devices are able to interact with each others, with existing communication networks and, ultimately, with the Internet. As...
Article
Full-text available
A clever and efficient management of transport and logistics are fundamental in manufacturer companies, starting to adopt new methodologies, inspired to the emerging industry 4.0 principles. Such a behavior is influenced by the spreading of the Internet of Things (IoT) paradigm, helping to automate a lot of features, if not all, of products’ manage...
Article
Full-text available
Letting both data producers and data consumers be aware of the levels of security and privacy guaranteed within an IoT-based system represents an important goal to be pursued. In fact, the presence of multiple and heterogeneous data sources, as well as wireless communication standards, increases the risk of violation in IoT scenarios. Besides contr...
Article
Full-text available
Denial of Service (DoS) attack represents until now a relevant problem in Internet-based contexts. In fact, it is both difficult to recognize and to counteract. Along with the adoption and diffusion of Internet of Things (IoT) applications, such an issue has become more urgent to solve, due to the presence of heterogeneous data sources and to the w...
Article
Full-text available
Both people and organization are widely accepting and adopting the functionalities offered by the smart home or smart building applications. This is due to the many advantages, in easing users’ every-day life and work, provided by the emerging Internet of Things (IoT) technologies and devices, equipped with sensors, cameras, or actuators, and able...
Chapter
Full-text available
The diffusion of Internet of Things (IoT) technologies enables the provision of advanced and valuable services, but also raises several challenges. First of all, the increasing number of heterogeneous interconnected devices creates scalability and interoperability issues and thus a flexible middleware platform is needed to manage all the sources to...
Article
Full-text available
Many solutions based on machine learning techniques have been proposed in literature aimed at detecting and promptly counteracting various kinds of malicious attack (data violation, clone, sybil, neglet, greed, DoS attacks), which frequently affect Wireless Sensor Networks (WSN). Besides recognizing the corrupted or violated information, also the a...
Article
Full-text available
Security and privacy represent critical issues for a wide adoption of IoT technologies both by industries and people in their every-day life. Besides, the complexity of an IoT system’s management resides in the presence of heterogeneous devices, which communicate by means of different protocols and provide information belonging to various applicati...
Article
Full-text available
One of the hottest topics in the Internet of Things (IoT) domain relates to the ability of enabling computation and storage at the edges of the network. This is becoming a key feature in order to ensure the ability of managing in a scalable way service requests with low response times. This means being able to acquire, store, and process IoT-genera...
Article
Full-text available
Internet of Things (IoT) is characterized by heterogeneous technologies, which concur to the provisioning of innovative services in different application domains. Introducing efficient mechanisms for collecting, processing, and delivering data generated by sensors, medical equipment, wearable devices, and humans, is a key enabling factor for advanc...
Article
Full-text available
Internet of Things (IoT) is characterized by heterogeneous technologies, which concur to the provisioning of innovative services in different application domains. Introducing efficient mechanisms for collecting, processing, and delivering data generated by sensors, medical equipment, wearable devices, and humans, is a key enabling factor for advanc...
Conference Paper
Full-text available
Security, interoperability, scalability, and mobility support are key challenges for the Internet of Things (IoT). Information Centric Networking (ICN) is an emerging paradigm for the Future Internet design that brings all the potential to face these challenges thanks to name-driven networking primitives. As a matter of fact, ICN natively supports...
Conference Paper
Full-text available
Security threats may hinder the large scale adoption of the emerging Internet of Things (IoT) technologies. Besides efforts have already been made in the direction of data integrity preservation, confidentiality and privacy, several issues are still open. The existing solutions are mainly based on encryption techniques, but no attention is actually...
Article
Full-text available
Thanks to the availability of miniaturized camera and microphones, nowadays Wireless Multimedia Sensor Networks (WMSNs) can sense and deliver audio/video signals from a target environment to remote analysis sites. Hence, new opportunity are disclosed for advanced applications in health care, surveillance, military, and traffic monitoring domains, t...
Conference Paper
Full-text available
The continuous interest in Wireless Sensor Networks (WSN) has led to the development of several applications, from traditional monitoring, to cooperative and distributed control and management systems, to automated industrial machinery and logistics. The design and optimization of specialized WSN platforms and communication protocols typically reli...
Article
Full-text available
Over recent years, the continuous interest in wireless sensor networks (WSNs) has led to the appearance of new modeling methods and simulation environments for WSN applications. A broad variety of different simulation tools have been designed to explore and validate WSN systems before actual implementation and real-world deployment. These tools add...
Article
Full-text available
The increasing diffusion of services enabled by Internet of Things (IoT) technologies raises several risks associated to security and data quality. Together with the high number of heterogeneous interconnected devices, this creates scalability issues, thereby calling for a flexible middleware platform able to deal with both security threats and dat...
Conference Paper
The satisfaction of security and data quality requirements plays a fundamental role in the Internet of Things (IoT) scenario. Such a dynamic environment requires the adoption of heterogeneous technologies to provide customized services in various application domains and both security threats and data quality issues need to be addresses in order to...
Article
Full-text available
Internet of Things (IoT) is characterized, at the system level, by high diversity with respect to enabling technologies and supported services. IoT also assumes to deal with a huge amount of heterogeneous data generated by devices, transmitted by the underpinning infrastructure and processed to support value-added services. In order to provide user...
Conference Paper
Full-text available
Internet of Things (IoT) involves heterogeneous technologies (i.e., WSN, RFID, actuators) able to exchange data acquired from the environment in order to provide services to the requesting users. In such a scenario the privacy and the quality (i.e., in terms of accuracy, timeliness, completeness) of the handled information represent critical issues...
Article
The ongoing revolution of Internet of Things (IoT), together with the growing diffusion of robots in many activities of every day life, makes IoT-aided robotics applications a tangible reality of our upcoming future. Accordingly, new advanced services, based on the interplay between robots and “things”, are being conceived in assisting humans. Neve...
Article
Most applications of wireless sensor networks (WSNs) rely on data about the positions of sensor nodes, which are not necessarily known beforehand. Several localization approaches have been proposed but most of them omit to consider that WSNs could be deployed in adversarial settings, where hostile nodes under the control of an attacker coexist with...
Conference Paper
Full-text available
Secure data aggregation still represents a very challenging topic in wireless sensor networks’ research. In fact, only few solutions exists to face, simultaneously, confidentiality, integrity, adaptive aggregation, and privacy issues. Furthermore, proposals available in literature mainly assume flat network architectures, without leveraging the pec...
Article
Full-text available
Typical wireless sensor networks (WSNs) applications are characterized by a certain number of different requirements such as: data accuracy, localization, reputation, security, and confidentiality. Moreover, being often battery powered, WSNs face the challenge of ensuring privacy and security despite power consumption limitations. When the applicat...
Article
Wireless sensor networks (WSNs) in which the location of sensors is a key information are becoming more and more important. Moreover, in many cases privacy is a key issues for such network which can be the target of different kind of security attacks. In this paper we present an approach, named Cross Layer Protocol (CLP), for improving data quality...
Article
The term “Internet-of-Things” is used as an umbrella keyword for covering various aspects related to the extension of the Internet and the Web into the physical realm, by means of the widespread deployment of spatially distributed devices with embedded identification, sensing and/or actuation capabilities. Internet-of-Things envisions a future in w...
Article
End-to-end data aggregation, without degrading sensing accuracy, is a very relevant issue in wireless sensor networks (WSN) that can prevent network congestion to occur. Moreover, privacy management requires that anonymity and data integrity are preserved in such networks. Unfortunately, no integrated solutions have been proposed so far, able to ta...
Conference Paper
Full-text available
This paper describes the work done in the project MoseForAgrofood (Ms4A) whose goal is to take advantage of mobile technologies to develop augmented Web services for the agrofood domain. The use of personal devices, such as smart phones and tablets, brings in specific issues such as the need to consider quality of protection, quality of services, q...
Conference Paper
Wireless sensor networks (WSN) are the target of different kinds of security attacks. The network nodes, which sense, aggregate, encrypt and transmit data, play a key role for assuring data quality. In this paper we present a way in which the network sink can evaluate the nodes reputation in order to determine whether one or more nodes are behaving...
Conference Paper
Full-text available
Wireless Sensor Networks (WSNs) provide an extensible and effective means to monitor large and geographically diverse areas. Nodes in a WSN are characterized by very strict constraints in terms of computing power and energy consumption, as a result of which efficient and secure data aggregation techniques are being proposed as enabling technology f...
Article
Robust image and video communications have become more imperative due to the ubiquitous proliferation of multimedia applications over wireless sensor networks. In this work, the transmission distortions on the image data induced by both channel and instant ...
Chapter
Enterprises have adopted various strategies to protect customers’ privacy and to make public their policies. This chapter presents a conceptual model for supporting the definition of privacy policies. The model, described by means of UML, introduces a set of concepts concerning privacy and defines the existent relationships among those concepts alo...
Conference Paper
Full-text available
Wireless Sensor Networks (WSNs) support data collection and distributed data processing by means of very small sensing devices that are easy to tamper and clone: therefore classical security solutions based on access control and strong authentication are difficult to deploy. In this paper we look at the problem of assessing the reliability of node...
Conference Paper
Full-text available
Wireless Sensor Networks (WSN) support data collection and distributed data processing by means of very small sensing devices that are easy to tamper and cloning: therefore classical security solutions based on access control and strong authentication are difficult to deploy. In this paper we look at the problem of assessing security of node locali...
Article
Full-text available
Wireless Sensor Networks (WSN) support data collection and distributed data processing by means of very small sensing devices that are easy to tamper and cloning: therefore classical security solutions based on access control and strong authentication are difficult to deploy. In this paper we look at the problem of assessing security of node locali...
Article
Risk assessment is a well-established engineering practise widely applied on technological systems. Despite its spread, few attempts have been made to formalise its basis in order to provide a non-empirical foundation. In this article we introduce a formal analysis of risk assessment in an algebraic framework, considering also the case of multiple...
Conference Paper
Full-text available
Nowadays Wireless Sensor Networks (WSN) are used in many application contexts. Data handled by WSN are required to be protected for privacy reasons since they can be directly or indirectly related to individuals. The problem of preventing the identification of individuals starting from their data, known as anonymity, is a fundamental requirement fo...
Conference Paper
Wireless Sensor Networks are characterized by very tight energy requirements and therefore they impose strict constraints on the amount of data that can be transmitted by sensors nodes. In order to achieve such a goal many data aggregation algorithm have been defined. However, in order to ensure a broad deployment of the innovative services deliver...