Gianluca Cena’s research while affiliated with The National Academies of Sciences, Engineering, and Medicine and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (206)


Robust Multicast Origin Authentication in MACsec and CANsec for Automotive Scenarios
  • Preprint

February 2025

·

4 Reads

Gianluca Cena

·

·

Having everything interconnected through the Internet, including vehicle onboard systems, is making security a primary concern in the automotive domain as well. Although Ethernet and CAN XL provide link-level security based on symmetric cryptography, they do not support origin authentication for multicast transmissions. Asymmetric cryptography is unsuitable for networked embedded control systems with real-time constraints and limited computational resources. In these cases, solutions derived from the TESLA broadcast authentication protocol may constitute a more suitable option. In this paper, some such strategies are presented and analyzed that allow for multicast origin authentication, also improving robustness to frame losses by means of interleaved keychains. A flexible authentication mechanism that relies on a unified receiver is then proposed, which enables transmitters to select strategies at runtime, to achieve the best compromise among security, reliability, and resource consumption.







On the Accuracy and Precision of Moving Averages to Estimate Wi-Fi Link Quality

November 2024

The radio spectrum is characterized by a noticeable variability, which impairs performance and determinism of every wireless communication technology. To counteract this aspect, mechanisms like Minstrel are customarily employed in real Wi-Fi devices, and the adoption of machine learning for optimization is envisaged in next-generation Wi-Fi 8. All these approaches require communication quality to be monitored at runtime. In this paper, the effectiveness of simple techniques based on moving averages to estimate wireless link quality is analyzed, to assess their advantages and weaknesses. Results can be used, e.g., as a baseline when studying how artificial intelligence can be employed to mitigate unpredictability of wireless networks by providing reliable estimates about current spectrum conditions.


Executable QR codes with Machine Learning for Industrial Applications

November 2024

·

16 Reads

Executable QR codes, also known as eQR codes or just sQRy, are a special kind of QR codes that embed programs conceived to run on mobile devices like smartphones. Since the program is directly encoded in binary form within the QR code, it can be executed even when the reading device is not provided with Internet access. The applications of this technology are manifold, and range from smart user guides to advisory systems. The first programming language made available for eQR is QRtree, which enables the implementation of decision trees aimed, for example, at guiding the user in operating/maintaining a complex machinery or for reaching a specific location. In this work, an additional language is proposed, we term QRind, which was specifically devised for Industry. It permits to integrate distinct computational blocks into the QR code, e.g., machine learning models to enable predictive maintenance and algorithms to ease machinery usage. QRind permits the Industry 4.0/5.0 paradigms to be implemented, in part, also in those cases where Internet is unavailable.



Packet Steering Mechanisms for MLO in Wi-Fi 7

November 2024

·

3 Reads

Besides extremely high throughput, Wi-Fi 7 is also aimed at providing users a more deterministic behavior, characterized by shorter average latency and smaller jitters. A key mechanism to achieve this is multi-link operation, which brings simultaneous multi-band communication to client stations as well. In this paper, traffic steering policies are briefly reviewed and grouped into general classes, each one with its advantages and limitations. A basic mechanism for supporting dynamic steering is then described, which is simple enough to allow implementation in real Wi-Fi chipsets but highly flexible at the same time. Its operation can be driven by the host on a per-packet basis, and this permits to optimize spectrum usage depending on the requirements of applications and the traffic pattern they generate.


Citations (38)


... In contrast, wireless communication networks (e.g., Wi-Fi 6) offer advantages in terms of flexibility and scalability, making them suitable for dynamic device access. However, Wi-Fi often faces problems such as increased latency and unstable transmission in high-density, multi-device parallel operation scenarios (especially in environments with severe signal interference) [20,21], and the technology still lacks network auto-reconfiguration capabilities. In addition, bandwidth bottlenecks can seriously affect system performance and productivity when dealing with large-scale data transfers. ...

Reference:

SharkNet Networks Applications in Smart Manufacturing Using IoT and Machine Learning
A Software Platform for Testing Multi-Link Operation in Industrial Wi-Fi Networks
  • Citing Conference Paper
  • April 2024

... When digital twins [8], [9] are exploited for optimizing the overall behavior of an industrial communication system (customarily made up of a number of infrastructure Wi-Fi networks interconnected through an Ethernet backbone), the amount of information potentially available to the STAs to support packet steering can be quite large. Moreover, the exact nature of the different pieces of information that can be used to this purpose may vary consistently among setups, which demands for highly-flexible software implementations. ...

Multi-Link Operation and Wireless Digital Twin to Support Enhanced Roaming in Next-Gen Wi-Fi
  • Citing Conference Paper
  • April 2024

... Its initial version (PRIL-F) [13], [14] permits to lower energy consumption on the first-hop of every path. Subsequently, it has been extended to properly manage multi-hop networks as well (PRIL-M) [15]. In practice, PRIL-F decreases power consumption of nodes located one hop away from the source node, whereas PRIL-M deals with all the following hops to the destination. ...

Ultralow Power and Green TSCH-Based WSNs With Proactive Reduction of Idle Listening
  • Citing Article
  • Full-text available
  • September 2024

IEEE Internet of Things Journal

... Basically, an eQR code (sQRy) is a QR code that contains a program written in the QRscript programming language [8]. The idea of including a program into a QR code was preliminarily proposed in [9] and later expanded in [10]. eQR technology permits intelligence to be embedded inside a QR code and its operation does not require Internet access. ...

QR Codes: From a Survey of the State of the Art to Executable eQR Codes for the Internet of Things

IEEE Internet of Things Journal

... W ITH the rapid development of the Industrial Internet of Things(IIoT) [1], [2], Wireless Multimedia Sensor Networks (WMSNs) have been widely used in Industrial Automation [3], Smart Home [4], Area Monitoring [5] and other fields. The sensor nodes of these networks are equipped with cameras, microphones, and other sensors capable of collecting multimedia data such as video, audio, and images from the physical environment. ...

IEEE Access Special Section: Advances on High Performance Wireless Networks for Automation and IIoT

IEEE Access

... Unfortunately, this value can be only evaluated "a posteriori", since it refers in part to outcomes of future attempts, and hence it cannot be used to optimize network operation at runtime. Conversely, it represents a good choice as the target for offline training of ML-based prediction models, e.g., artificial neural networks (ANN) [15]. If FDR evaluation is required to be carried out at runtime, no samples x j in the future (for which j > i) can be used. ...

On the Use of Artificial Neural Networks to Predict the Quality of Wi-Fi Links

IEEE Access

... It's important to note that while TSCH proposals several advantages, its implementation can be more complex than other communication methods. Depending on the specific requirements and constraints of your IoT application, TSCH can provide a valuable solution for achieving reliable and energy-efficient communication in a variety of scenarios [64][65][66][67][68]. ...

Assessing the Effectiveness of Channel Hopping in IEEE 802.15.4 TSCH Networks

IEEE Open Journal of the Industrial Electronics Society

... The EMA model is a smoothing technique designed to assign exponentially decreasing weights to past observations. It has proven to be effective in real problems in comparison with other techniques [18]. This implies that recent data points carry more influence than older ones, allowing the EMA to effectively capture the most recent trends in the data. ...

Predicting Wireless Channel Quality by Means of Moving Averages and Regression Models
  • Citing Conference Paper
  • April 2023

... These features are important factors in the successful implementation of Wi-Fi networks for modern wireless communication. Furthermore, several papers, among which [44] [45], demonstrate the successful deployment of IEEE 802.11a and IEEE 802.11g and more recently IEEE 802.11ax standards in industrial scenarios, for efficient and reliable wireless communication. Thus, understanding the technical details of these implementations is crucial for researchers and practitioners in the field of wireless communication. ...

Seamless Redundancy for High Reliability Wi-Fi

... However, above situation can not take place in small embedded systems where devices are interconnected through multidrop busses like CAN and 10Base-T1S Single Pair Ethernet (SPE) [27], as those found onboard of vehicles in the automotive domain, since holding frames back in these cases is just impossible. Although bridges can be possibly envisaged to interconnect a number of busses [30], assuming that they can not be reprogrammed to behave as MITM once deployed is not unrealistic. Moreover, we do not account for attacks that exploit physical access to the vehicle (like injection ones) to alter the network topology, e.g., by inserting a tampered relay device in the middle of a bus, as we are interested in remotely-delivered security threats. ...

Composite CAN XL-Ethernet Networks for Next-Gen Automotive and Automation Systems