Svoboda | Graniru | BBC Russia | Golosameriki | Facebook
Skip to main content
Blockchain is a distributed ledger technology that has attracted both practitioners and academics attention in recent years. Several conceptual and few empirical studies have been published focusing on addressing current issues and... more
Blockchain is a distributed ledger technology that has attracted both practitioners and academics attention in recent years. Several conceptual and few empirical studies have been published focusing on addressing current issues and recommending the future research directions of supply chain management. To identify how blockchain can contribute to supply chain management, this paper conducts a systematic review through bibliometric and network analysis. We determined the key authors, significant studies, and the collaboration patterns that were not considered by the previous publications on this angel of supply chain management. Using citation and co-citation analysis, key supply chain areas that blockchain could contribute are pinpointed as supply chain management, finance, logistics, and security. Furthermore, it revealed that Internet of Things (IoT) and smart contracts are the leading emerging technologies in this field. The results of highly cited and co-cited articles demonstrate that blockchain could enhance transparency, traceability, efficiency, and information security in supply chain management. The analysis also revealed that empirical research is scarce in this field. Therefore, implementing blockchain in the real-world supply chain is a considerable future research opportunity.
Increasing the efficiency of heat pump systems primarily used for heat supply to buildings is an important topic. This is especially true for systems constructed according to non-standard schemes and which use low-grade heat from various... more
Increasing the efficiency of heat pump systems primarily used for heat supply to buildings is an important topic. This is especially true for systems constructed according to non-standard schemes and which use low-grade heat from various sources that are rarely considered for these purposes. Such studies require special, often expensive, data acquisition systems. In this paper, a low-cost computer-based monitoring system is presented. The monitoring system incorporates solutions which are new or seldom used. It is shown that modern semiconductor thermistors can replace commonly used platinum temperature sensors and thermocouples. A proposal for processing frequency output signals from sensors through an analog-to-digital converter and a way to reduce the number of required input channels are described. The monitoring system allows optimization of various types of heat-pump-based installations. The system has been used for quite a long time to monitor the operation of the heat pump i...
Sensors and intelligent applications enabling smart vehicular traffic create an opportunity for improving the welfare of people, from the viewpoints of efficiency, sustainability, and social inclusivity. Like the opportunities, challenges... more
Sensors and intelligent applications enabling smart vehicular traffic create an opportunity for improving the welfare of people, from the viewpoints of efficiency, sustainability, and social inclusivity. Like the opportunities, challenges of such an endeavour are multifaceted, including the scalable collection and processing of the hefty data volumes generated by sensors, and the coordinated operation between selfish agents. The purpose of this work is to survey recent literature with an emphasis on applications and a multidisciplinary eye, with the aim of stimulating discussion and reflection in the scientific communities. The principal application areas of smart traffic and smart mobility are discussed, synthesizing different perspectives. Many intriguing areas for future research exist besides those relative to connectivity, data fusion, and privacy. Some research challenges pertinent to sustainability, insurance, simulation and the handling of ambiguous information are highlighted.
A well-recognized problem in high-speed all-optical networks is that fibres and switches frequently fail. When a network, designed in a non-robust way, encounters such kind of problem it can become highly vulnerable, i.e. experiencing... more
A well-recognized problem in high-speed all-optical networks is that fibres and switches frequently fail. When a network, designed in a non-robust way, encounters such kind of problem it can become highly vulnerable, i.e. experiencing large fractions of connections disruption. This makes resiliency a key issue in network design and thus efficient protection schemas are needed so that when a failure
With the increasing popularity of the Internet, unsolicited electronic mail (spam) has become a major concern. It fills up user’s mailboxes, clogs mail relays, wastes postmaster time, and creates inconveniences for sites that have been... more
With the increasing popularity of the Internet, unsolicited electronic mail (spam) has become a major concern. It fills up user’s mailboxes, clogs mail relays, wastes postmaster time, and creates inconveniences for sites that have been used as a relay. This seems to be a growing problem, and without appropriate countermeasures, spam messages could eventually undermine the usability of e-mail. In this paper, we propose a cooperative spam-avoidance strategy based on the concept of restricting, at the network border and mail relay level, the mail sending function through properly authorized mail gateways registered as proper new Resource Records in the DNS System. If accepted and enforced by the largest number possible of network and mail administrators on the Internet, this strategy may result in a substantial reduction of the worldwide e-mail spam phenomenon.
ABSTRACT In this paper we present EnergySave, a smart energy-saving system that, by leveraging the consolidated WoL (Wake on LAN) technology, allows the remote wake-up of PCs from a centralized management server, providing easy and secure... more
ABSTRACT In this paper we present EnergySave, a smart energy-saving system that, by leveraging the consolidated WoL (Wake on LAN) technology, allows the remote wake-up of PCs from a centralized management server, providing easy and secure power management capabilities for local or remote IP-based networks of personal computers (PCs). We also present a lightweight web-based platform implementing the remote management interface as less intrusively as possible. Finally, we model the mathematical saving functions to be used in order to evaluate through simulation the amount of potential energy savings, and hence the whole framework effectiveness, both in the general case and in a real case scenario. Results show that significant savings are achievable provided that the hardware supports the Wake-on-LAN specifications and that proper configuration of the Web server is set-up, allowing the WoL magic packet to travel to the destination hosts and wake them up only when they are really needed.
... Francesco Palmieri and Ugo Fiore ... This is ordinarily achieved by applying the following techniques: − OS detection: A common OS detection technique is "IP stack fingerprinting" – the determination of remote OS type by... more
... Francesco Palmieri and Ugo Fiore ... This is ordinarily achieved by applying the following techniques: − OS detection: A common OS detection technique is "IP stack fingerprinting" – the determination of remote OS type by comparison of variations in OS IP stack im-plementations ...
Simulation seems to be the best available alternative to the deployment of expensive and complex testbed infrastructuresfor the activities oftesting, validating and evaluating optical network control protocols and algorithms. In this... more
Simulation seems to be the best available alternative to the deployment of expensive and complex testbed infrastructuresfor the activities oftesting, validating and evaluating optical network control protocols and algorithms. In this paper we present SimulNet, a specialized optical ...
Due to the increasing threat of attacks and malicious activities, the use of firewall technology is an important milestone toward making networks of any complexity and size secure. Unfortunately, the inherent difficulties in designing and... more
Due to the increasing threat of attacks and malicious activities, the use of firewall technology is an important milestone toward making networks of any complexity and size secure. Unfortunately, the inherent difficulties in designing and managing firewall policies within the modern highly distributed, dynamic and heterogeneous environments might greatly limit the effectiveness of firewall security. It is therefore desirable to
ABSTRACT Energy consumption is now one of the most important issues for network carriers, since the majority of the energy needed for their operation is consumed in the wireless access and optical transport networks. The continuous growth... more
ABSTRACT Energy consumption is now one of the most important issues for network carriers, since the majority of the energy needed for their operation is consumed in the wireless access and optical transport networks. The continuous growth in the wireless customers and traffic volumes and the consequent energy demand on modern carriers’ broadband infrastructures require reconsidering their energy efficiency, by starting from the formulation of new, more complete and representative network models that should become the foundations for modern energy-aware control plane architectures.Accordingly, this work presents a novel comprehensive energy model for next-generation wireless access-over-optical-transport networks characterized by hybrid power systems (i.e., multiple dynamically available power sources). The objective is to identify the energy-related information that need to be handled at the control plane layer to support energy-aware networking practices. Such information can be made available to suitable energy-aware routing and wavelength assignment algorithms that may exploit them to optimize the overall network energy-consumption and reducing the associated carbon footprint. The proposed model may be taken as a reference for the implementation of new energy-aware control plane protocols (routing and signaling) that make use of power-related considerations to achieve energy-efficiency and energy-awareness in wavelength-routed network infrastructures.
ABSTRACT Despite the wide deployment of beyond 3G cellular networks and high capacity Wi-Fi coverage infrastructures, finding the best way for achieving ubiquitous and secure mobile data transfer services in everyday's life... more
ABSTRACT Despite the wide deployment of beyond 3G cellular networks and high capacity Wi-Fi coverage infrastructures, finding the best way for achieving ubiquitous and secure mobile data transfer services in everyday's life activities, it is still an open question. In particular, security becomes a key factor in such a scenario, since a large number of mobile terminal devices (smartphones, handhelds, tablets) simultaneously supporting multiple networking technologies, may be used to store, access, manipulate, or communicate sensitive data from everywhere and at any time. However, the computational efforts required for achieving security, due to the inherent complexity of cryptographic algorithms, heavily affect the power consumption of the involved terminals. Such energy demand, together with the amount of power already required to manage the communication activities carried out by using multiple network interfaces, make energy efficient secure communication among mobile hardware-constrained handheld devices, a really challenging topic. Based on above considerations, we present the architecture of a framework which enables secure end-to-end and reliable data transfer for heterogeneous mobile terminals by also describing and modeling its power demand, with the aim of achieving a robust and reliable ubiquitous data transfer service also minimizing the overall battery consumption in such devices.
ABSTRACT Distributed cryptographic file systems enable file sharing among their users and need the adoption of a key management scheme for the distribution of the cryptographic keys to authorized users according to their specific degree... more
ABSTRACT Distributed cryptographic file systems enable file sharing among their users and need the adoption of a key management scheme for the distribution of the cryptographic keys to authorized users according to their specific degree of trust. In this paper we describe the architecture of a basic secure file sharing facility relying on a multi-party threshold-based key-sharing scheme that can be overlaid on top of the existing stackable networked file systems, and discuss its application to the implementation of distributed cryptographic file systems. It provides flexible access control policies supporting multiple combination of roles and trust profiles. A proof of concept prototype implementation within the Linux operating system framework demonstrated its effectiveness in terms of performance and security robustness.
Industrial assistive systems result from a multidisciplinary effort that integrates IoT (and Industrial IoT), Cognetics, and Artificial Intelligence. This paper evaluates the Prediction by Partial Matching algorithm as a component of an... more
Industrial assistive systems result from a multidisciplinary effort that integrates IoT (and Industrial IoT), Cognetics, and Artificial Intelligence. This paper evaluates the Prediction by Partial Matching algorithm as a component of an assembly assistance system that supports factory workers, by providing choices for the next manufacturing step. The evaluation of the proposed method was performed on datasets collected within an experiment involving trainees and experienced workers. The goal is to find out which method best suits the datasets in order to be integrated afterwards into our context-aware assistance system. The obtained results show that the Prediction by Partial Matching method presents a significant improvement with respect to the existing Markov predictors.
ABSTRACT In modern optical networks, infrastructure management is faced with the challenge of using expensive equipment and communication resources as efficiently as possible. This now includes keeping power consumption costs at a minimum... more
ABSTRACT In modern optical networks, infrastructure management is faced with the challenge of using expensive equipment and communication resources as efficiently as possible. This now includes keeping power consumption costs at a minimum and using the available optical links in a balanced way, in addition to the traditional goals of providing the best possible performance to the end customers while meeting their quality requirements. Accordingly, this paper presents a heuristic single-step lightpath routing and wavelength assignment algorithm, handling online dynamic connection requests within a fully distributed network control plane. By using shortest path routing, the presented scheme determines the best compromise solution between the users' and carrier's objectives. The former can be mainly expressed in terms of connection QoS requirements, while the latter comprises network engineering (distributing the load in order to achieve near-optimum resource usage) and containing energy consumption. This approach is able to find, in a polynomial computing time, a multiobjective optimization solution that maximizes the carriers' return of investment and supports a high number of users' request while drastically reducing the network operational expenditures, as extensively demonstrated through a simulation.
ABSTRACT Federated cloud organizations, spanning across multiple networked sites that provide both computing and storage resources, can be considered the state-of-the-art solutions for providing multi-tenant runtime services in modern... more
ABSTRACT Federated cloud organizations, spanning across multiple networked sites that provide both computing and storage resources, can be considered the state-of-the-art solutions for providing multi-tenant runtime services in modern distributed processing environments. In these scenarios, by re-optimizing the communication paths between virtual machines and big data sources, at evenly spaced interval or when required by circumstances, the overall communication and runtime resource utilization on the cloud infrastructure is re-balanced, so that more virtual machines can be allowed to access the needed big data sources with adequate bandwidth, thereby significantly improving the perceived performance and quality of service. The problem of re-optimization is tackled with a powerful meta-heuristic, the greedy randomized adaptive search procedure (GRASP), augmented by path re-linking. In order to evaluate the proposed approach, extensive simulations have been performed, leading to very interesting results, demonstrating the effectiveness and validity of the underlying ideas and their applicability to real large-scale federated cloud scenarios.
... Aniello Castiglione ∗ , Alfredo De Santis † Dipartimento di Informatica Universit`a degli Studi di Salerno I-84084 Fisciano (SA), Italy [email protected] ∗ , [email protected] † ... Initially formulated in [2] it involves two... more
... Aniello Castiglione ∗ , Alfredo De Santis † Dipartimento di Informatica Universit`a degli Studi di Salerno I-84084 Fisciano (SA), Italy [email protected] ∗ , [email protected] † ... Initially formulated in [2] it involves two prisoners, Alice and Bob, as well as a warden named Wendy. ...
... In situations where transit routing is used [27], internal traffic between mobile nodes may even cross the network border. ... To contain or at least mitigate the impact and spread of these attack “vectors”, wireless access control... more
... In situations where transit routing is used [27], internal traffic between mobile nodes may even cross the network border. ... To contain or at least mitigate the impact and spread of these attack “vectors”, wireless access control environments must be able to examine and evaluate ...
ABSTRACT Despite the wide deployment of advanced wireless coverage infrastructures, finding the best way for achieving secure mobile communication in every-day's life activities is still an open question. Indeed, a large number of... more
ABSTRACT Despite the wide deployment of advanced wireless coverage infrastructures, finding the best way for achieving secure mobile communication in every-day's life activities is still an open question. Indeed, a large number of mobile terminals, supporting multiple networking technologies, may be used to manage data from everywhere and at anytime. However, the effort required for achieving security, given the complexity of cryptographic algorithms, heavily affects the power consumption of terminals. Such energy demand, together with the one required to manage communication activities, makes energy-efficient secure communication among hardware-constrained handheld devices a challenging topic.
Research Interests:
ABSTRACT SUMMARY Network anomalies, circumstances in which the network behavior deviates from its normal operational baseline, can be due to various factors such as network overload conditions, malicious/hostile activities, denial of... more
ABSTRACT SUMMARY Network anomalies, circumstances in which the network behavior deviates from its normal operational baseline, can be due to various factors such as network overload conditions, malicious/hostile activities, denial of service attacks, and network intrusions. New detection schemes based on machine learning principles are therefore desirable as they can learn the nature of normal traffic behavior and autonomously adapt to variations in the structure of ‘normality’ as well as recognize the significant deviations as suspicious or anomalous events. The main advantages of these techniques are that, in principle, they are not restricted to any specific environment and that they can provide a way of detecting unknown attacks. Detection performance is directly correlated with the traffic model quality, in terms of ability of representing the traffic behavior from its most characterizing internal dynamics. Starting from these ideas, we developed a two-stage anomaly detection strategy based on multiple distributed sensors located throughout the network. By using Independent Component Analysis, the first step, modeled as a Blind Source Separation problem, extracts the fundamental traffic components (the ‘source’ signals), corresponding to the independent traffic dynamics, from the multidimensional time series incoming from the sensors, corresponding to the perceived ‘mixed/aggregate’ effect of traffic on their interfaces. These components will be used to build the baseline traffic profiles needed in the second supervised phase, based on a binary classification scheme (detection is casted into an anomalous/normal classification problem) driven by machine learning-inferred decision trees.Copyright © 2013 John Wiley & Sons, Ltd.
ABSTRACT Distributed cryptographic file systems enable file sharing among their users and need the adoption of a key management scheme for the distribution of the cryptographic keys to authorized users according to their specific degree... more
ABSTRACT Distributed cryptographic file systems enable file sharing among their users and need the adoption of a key management scheme for the distribution of the cryptographic keys to authorized users according to their specific degree of trust. In this paper we describe the architecture of a basic secure file sharing facility relying on a multi-party threshold-based key-sharing scheme that can be overlaid on top of the existing stackable networked file systems, and discuss its application to the implementation of distributed cryptographic file systems. It provides flexible access control policies supporting multiple combination of roles and trust profiles. A proof of concept prototype implementation within the Linux operating system framework demonstrated its effectiveness in terms of performance and security robustness.
ABSTRACT Survivability and scalability are the main emerging challenges in command and control of ubiquitous networked entities operating in untrusted communication scenarios, due to the increasing sophistication of the detection and... more
ABSTRACT Survivability and scalability are the main emerging challenges in command and control of ubiquitous networked entities operating in untrusted communication scenarios, due to the increasing sophistication of the detection and mitigation/defeating techniques together with the increasing number of elements to be controlled and their distribution over multiple heterogeneous communication infrastructures. Accordingly, this work focuses on a new more robust and scalable botnet-based command and control architecture, aiming at wiping off any rigid master-slave relationship and autonomizing the bot operating roles, with significant agility gains in the whole overlay communication infrastructure. It relies on swarm intelligence and in particular on stigmergic communication, ensuring spontaneous, implicit coordination and collaboration among the independent bot agents. The resulting architecture presents improved fault tolerance and dynamic adaptation to varying network conditions, by propagating control messages to any bot node through multiple short-range hops structured according to a dynamically built Degree Constrained Minimum Spanning Tree, whose distributed calculation is inspired to ant colony's foraging behavior. For this reason, it may constitute the basis for an evolutionary malware-based control and management scheme that can be used in several homeland security/defense scenarios where the botnet technology may be used as a support tool in strategic military or intelligence operations.
ABSTRACT People using smartphones to connect to the Internet for day-life activities has overtaken the number of people using canonical PCs. This lead to a huge quantity of security threats that usually tend to penetrate the defenses of a... more
ABSTRACT People using smartphones to connect to the Internet for day-life activities has overtaken the number of people using canonical PCs. This lead to a huge quantity of security threats that usually tend to penetrate the defenses of a smartphone in order to gain control of its resources. Differently, energy-based attacks have the objective of increasing the energy consumption of the victim device. It is important to highlight that this objective could be possibly achieved by just activating the system's defenses as a consequence of canonical attacks and letting the system defenses detect and (try to) defeat them. These activities consume additional energy and could led the mobile device to its complete uselessness. In this paper, an energy-based attack based on soliciting hardware-level encoding/decoding functions through properly crafted multimedia files is analyzed and its impact evaluated. Such kind of attacks are performed without accessing the device by taking advantage of the new HTML5 functionalities. A series of experiments have been performed in order to understand which are the codecs that have a more relevant impact on energy consumption, and, as a consequence, that make the attack more effective.
ABSTRACT Big Data processing architectures are now widely recognized as one of the most significant innovations in Computing in the last decade. Their enormous potential in collecting and processing huge volumes of data scattered... more
ABSTRACT Big Data processing architectures are now widely recognized as one of the most significant innovations in Computing in the last decade. Their enormous potential in collecting and processing huge volumes of data scattered throughout the Internet is opening the door to a new generation of fully distributed applications that, by leveraging the large amount of resources available on the network will be able to cope with very complex problems achieving performances never seen before. However, the Internet is known to have severe scalability limitations in moving very large quantities of data, and such limitations introduce the challenge of making efficient use of the computing and storage resources available on the network, in order to enable data-intensive applications to be executed effectively in such a complex distributed environment. This implies resource scheduling decisions which drive the execution of task towards the data by taking network load and capacity into consideration to maximize data access performance and reduce queueing and processing delays as possible. Accordingly, this work presents a data-centric meta-scheduling scheme for fully distributed Big Data processing architectures based on clustering techniques whose goal is aggregating tasks around storage repositories and driven by a new concept of “gravitational” attraction between the tasks and their data of interest. This scheme will benefit from heuristic criteria based on network awareness and advance resource reservation in order to suppress long delays in data transfer operations and result into an optimized use of data storage and runtime resources at the expense of a limited (polynomial) computational complexity.
ABSTRACT With the rapid growth and the increasing complexity of network infrastructures and the evolution of attacks, identifying and preventing network abuses is getting more and more strategic to ensure an adequate degree of protection... more
ABSTRACT With the rapid growth and the increasing complexity of network infrastructures and the evolution of attacks, identifying and preventing network abuses is getting more and more strategic to ensure an adequate degree of protection from both external and internal menaces. In this scenario many techniques are emerging for inspecting network traffic and discriminating between anomalous and normal behaviors to detect undesired or suspicious activities. Unfortunately, the concept of normal or abnormal network behavior depends on several factors and its recognition requires the availability of a model aiming at characterizing current behavior, based on a statistical idealization of past events. There are two main challenges when generating the training data needed for effective modeling. First, network traffic is very complex and unpredictable, and second, the model is subject to changes over time, since anomalies are continuously evolving. As attack techniques and patterns change, previously gained information about how to tell them apart from normal traffic may be no longer valid. Thus, a desirable characteristic of an effective model for network anomaly detection is its ability to adapt to change and to generalize its behavior to multiple different network environments. In other words, a self-learning system is needed. This suggests the adoption of machine learning techniques to implement semi-supervised anomaly detection systems where the classifier is trained with ''normal'' traffic data only, so that knowledge about anomalous behaviors can be constructed and evolve in a dynamic way. For this purpose we explored the effectiveness of a detection approach based on machine learning, using the Discriminative Restricted Boltzmann Machine to combine the expressive power of generative models with good classification accuracy capabilities to infer part of its knowledge from incomplete training data.
ABSTRACT Despite the wide deployment of beyond 3G cellular networks and high capacity Wi-Fi coverage infrastructures, finding the best way for achieving ubiquitous and secure mobile data transfer services in everyday's life... more
ABSTRACT Despite the wide deployment of beyond 3G cellular networks and high capacity Wi-Fi coverage infrastructures, finding the best way for achieving ubiquitous and secure mobile data transfer services in everyday's life activities, it is still an open question. In particular, security becomes a key factor in such a scenario, since a large number of mobile terminal devices (smartphones, handhelds, tablets) simultaneously supporting multiple networking technologies, may be used to store, access, manipulate, or communicate sensitive data from everywhere and at any time. However, the computational efforts required for achieving security, due to the inherent complexity of cryptographic algorithms, heavily affect the power consumption of the involved terminals. Such energy demand, together with the amount of power already required to manage the communication activities carried out by using multiple network interfaces, make energy efficient secure communication among mobile hardware-constrained handheld devices, a really challenging topic. Based on above considerations, we present the architecture of a framework which enables secure end-to-end and reliable data transfer for heterogeneous mobile terminals by also describing and modeling its power demand, with the aim of achieving a robust and reliable ubiquitous data transfer service also minimizing the overall battery consumption in such devices.
Research Interests:
ABSTRACT In this paper we present EnergySave, a smart energy-saving system that, by leveraging the consolidated WoL (Wake on LAN) technology, allows the remote wake-up of PCs from a centralized management server, providing easy and secure... more
ABSTRACT In this paper we present EnergySave, a smart energy-saving system that, by leveraging the consolidated WoL (Wake on LAN) technology, allows the remote wake-up of PCs from a centralized management server, providing easy and secure power management capabilities for local or remote IP-based networks of personal computers (PCs). We also present a lightweight web-based platform implementing the remote management interface as less intrusively as possible. Finally, we model the mathematical saving functions to be used in order to evaluate through simulation the amount of potential energy savings, and hence the whole framework effectiveness, both in the general case and in a real case scenario. Results show that significant savings are achievable provided that the hardware supports the Wake-on-LAN specifications and that proper configuration of the Web server is set-up, allowing the WoL magic packet to travel to the destination hosts and wake them up only when they are really needed.

And 39 more