Blockchain is a distributed ledger technology that has attracted both practitioners and academics attention in recent years. Several conceptual and few empirical studies have been published focusing on addressing current issues and... more
Blockchain is a distributed ledger technology that has attracted both practitioners and academics attention in recent years. Several conceptual and few empirical studies have been published focusing on addressing current issues and recommending the future research directions of supply chain management. To identify how blockchain can contribute to supply chain management, this paper conducts a systematic review through bibliometric and network analysis. We determined the key authors, significant studies, and the collaboration patterns that were not considered by the previous publications on this angel of supply chain management. Using citation and co-citation analysis, key supply chain areas that blockchain could contribute are pinpointed as supply chain management, finance, logistics, and security. Furthermore, it revealed that Internet of Things (IoT) and smart contracts are the leading emerging technologies in this field. The results of highly cited and co-cited articles demonstrate that blockchain could enhance transparency, traceability, efficiency, and information security in supply chain management. The analysis also revealed that empirical research is scarce in this field. Therefore, implementing blockchain in the real-world supply chain is a considerable future research opportunity.
Research Interests:
Increasing the efficiency of heat pump systems primarily used for heat supply to buildings is an important topic. This is especially true for systems constructed according to non-standard schemes and which use low-grade heat from various... more
Increasing the efficiency of heat pump systems primarily used for heat supply to buildings is an important topic. This is especially true for systems constructed according to non-standard schemes and which use low-grade heat from various sources that are rarely considered for these purposes. Such studies require special, often expensive, data acquisition systems. In this paper, a low-cost computer-based monitoring system is presented. The monitoring system incorporates solutions which are new or seldom used. It is shown that modern semiconductor thermistors can replace commonly used platinum temperature sensors and thermocouples. A proposal for processing frequency output signals from sensors through an analog-to-digital converter and a way to reduce the number of required input channels are described. The monitoring system allows optimization of various types of heat-pump-based installations. The system has been used for quite a long time to monitor the operation of the heat pump i...
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Sensors and intelligent applications enabling smart vehicular traffic create an opportunity for improving the welfare of people, from the viewpoints of efficiency, sustainability, and social inclusivity. Like the opportunities, challenges... more
Sensors and intelligent applications enabling smart vehicular traffic create an opportunity for improving the welfare of people, from the viewpoints of efficiency, sustainability, and social inclusivity. Like the opportunities, challenges of such an endeavour are multifaceted, including the scalable collection and processing of the hefty data volumes generated by sensors, and the coordinated operation between selfish agents. The purpose of this work is to survey recent literature with an emphasis on applications and a multidisciplinary eye, with the aim of stimulating discussion and reflection in the scientific communities. The principal application areas of smart traffic and smart mobility are discussed, synthesizing different perspectives. Many intriguing areas for future research exist besides those relative to connectivity, data fusion, and privacy. Some research challenges pertinent to sustainability, insurance, simulation and the handling of ambiguous information are highlighted.
Research Interests:
Research Interests:
Research Interests:
Research Interests: Engineering, Technology, Remote Sensing, Operations Research, Computer Networks, and 13 moreTime Series, Service Quality, Encryption, Traffic Management, Nonlinear Analysis, Intrusion Detection, Quality of Service, Recurrence plot, Traffic Flow, Recurrence Quantification Analysis, Network Traffic, Traffic Classification, and Deterministic Approach
Research Interests:
Research Interests: Distributed Computing, Computational Complexity, Routing, Next Generation Networks, Algorithm, and 15 moreOptical Switch, Communications networks, Optical network, Wavelength Conversion, Optical telecommunication, Optical fiber, Telecommunication network, Wavelength Division Multiplexing, Boolean Satisfiability, Internet, Communications, Heuristic algorithm, Frequency allocation, Next Generation Internet, and Switching Network
A well-recognized problem in high-speed all-optical networks is that fibres and switches frequently fail. When a network, designed in a non-robust way, encounters such kind of problem it can become highly vulnerable, i.e. experiencing... more
A well-recognized problem in high-speed all-optical networks is that fibres and switches frequently fail. When a network, designed in a non-robust way, encounters such kind of problem it can become highly vulnerable, i.e. experiencing large fractions of connections disruption. This makes resiliency a key issue in network design and thus efficient protection schemas are needed so that when a failure
Research Interests:
With the increasing popularity of the Internet, unsolicited electronic mail (spam) has become a major concern. It fills up user’s mailboxes, clogs mail relays, wastes postmaster time, and creates inconveniences for sites that have been... more
With the increasing popularity of the Internet, unsolicited electronic mail (spam) has become a major concern. It fills up user’s mailboxes, clogs mail relays, wastes postmaster time, and creates inconveniences for sites that have been used as a relay. This seems to be a growing problem, and without appropriate countermeasures, spam messages could eventually undermine the usability of e-mail. In this paper, we propose a cooperative spam-avoidance strategy based on the concept of restricting, at the network border and mail relay level, the mail sending function through properly authorized mail gateways registered as proper new Resource Records in the DNS System. If accepted and enforced by the largest number possible of network and mail administrators on the Internet, this strategy may result in a substantial reduction of the worldwide e-mail spam phenomenon.
Research Interests:
ABSTRACT In this paper we present EnergySave, a smart energy-saving system that, by leveraging the consolidated WoL (Wake on LAN) technology, allows the remote wake-up of PCs from a centralized management server, providing easy and secure... more
ABSTRACT In this paper we present EnergySave, a smart energy-saving system that, by leveraging the consolidated WoL (Wake on LAN) technology, allows the remote wake-up of PCs from a centralized management server, providing easy and secure power management capabilities for local or remote IP-based networks of personal computers (PCs). We also present a lightweight web-based platform implementing the remote management interface as less intrusively as possible. Finally, we model the mathematical saving functions to be used in order to evaluate through simulation the amount of potential energy savings, and hence the whole framework effectiveness, both in the general case and in a real case scenario. Results show that significant savings are achievable provided that the hardware supports the Wake-on-LAN specifications and that proper configuration of the Web server is set-up, allowing the WoL magic packet to travel to the destination hosts and wake them up only when they are really needed.
Research Interests:
... Francesco Palmieri and Ugo Fiore ... This is ordinarily achieved by applying the following techniques: − OS detection: A common OS detection technique is "IP stack fingerprinting" – the determination of remote OS type by... more
... Francesco Palmieri and Ugo Fiore ... This is ordinarily achieved by applying the following techniques: − OS detection: A common OS detection technique is "IP stack fingerprinting" – the determination of remote OS type by comparison of variations in OS IP stack im-plementations ...
Research Interests:
Simulation seems to be the best available alternative to the deployment of expensive and complex testbed infrastructuresfor the activities oftesting, validating and evaluating optical network control protocols and algorithms. In this... more
Simulation seems to be the best available alternative to the deployment of expensive and complex testbed infrastructuresfor the activities oftesting, validating and evaluating optical network control protocols and algorithms. In this paper we present SimulNet, a specialized optical ...
Research Interests:
Due to the increasing threat of attacks and malicious activities, the use of firewall technology is an important milestone toward making networks of any complexity and size secure. Unfortunately, the inherent difficulties in designing and... more
Due to the increasing threat of attacks and malicious activities, the use of firewall technology is an important milestone toward making networks of any complexity and size secure. Unfortunately, the inherent difficulties in designing and managing firewall policies within the modern highly distributed, dynamic and heterogeneous environments might greatly limit the effectiveness of firewall security. It is therefore desirable to
Research Interests:
ABSTRACT Energy consumption is now one of the most important issues for network carriers, since the majority of the energy needed for their operation is consumed in the wireless access and optical transport networks. The continuous growth... more
ABSTRACT Energy consumption is now one of the most important issues for network carriers, since the majority of the energy needed for their operation is consumed in the wireless access and optical transport networks. The continuous growth in the wireless customers and traffic volumes and the consequent energy demand on modern carriers’ broadband infrastructures require reconsidering their energy efficiency, by starting from the formulation of new, more complete and representative network models that should become the foundations for modern energy-aware control plane architectures.Accordingly, this work presents a novel comprehensive energy model for next-generation wireless access-over-optical-transport networks characterized by hybrid power systems (i.e., multiple dynamically available power sources). The objective is to identify the energy-related information that need to be handled at the control plane layer to support energy-aware networking practices. Such information can be made available to suitable energy-aware routing and wavelength assignment algorithms that may exploit them to optimize the overall network energy-consumption and reducing the associated carbon footprint. The proposed model may be taken as a reference for the implementation of new energy-aware control plane protocols (routing and signaling) that make use of power-related considerations to achieve energy-efficiency and energy-awareness in wavelength-routed network infrastructures.
Research Interests:
ABSTRACT Despite the wide deployment of beyond 3G cellular networks and high capacity Wi-Fi coverage infrastructures, finding the best way for achieving ubiquitous and secure mobile data transfer services in everyday's life... more
ABSTRACT Despite the wide deployment of beyond 3G cellular networks and high capacity Wi-Fi coverage infrastructures, finding the best way for achieving ubiquitous and secure mobile data transfer services in everyday's life activities, it is still an open question. In particular, security becomes a key factor in such a scenario, since a large number of mobile terminal devices (smartphones, handhelds, tablets) simultaneously supporting multiple networking technologies, may be used to store, access, manipulate, or communicate sensitive data from everywhere and at any time. However, the computational efforts required for achieving security, due to the inherent complexity of cryptographic algorithms, heavily affect the power consumption of the involved terminals. Such energy demand, together with the amount of power already required to manage the communication activities carried out by using multiple network interfaces, make energy efficient secure communication among mobile hardware-constrained handheld devices, a really challenging topic. Based on above considerations, we present the architecture of a framework which enables secure end-to-end and reliable data transfer for heterogeneous mobile terminals by also describing and modeling its power demand, with the aim of achieving a robust and reliable ubiquitous data transfer service also minimizing the overall battery consumption in such devices.
Research Interests:
Research Interests:
ABSTRACT Distributed cryptographic file systems enable file sharing among their users and need the adoption of a key management scheme for the distribution of the cryptographic keys to authorized users according to their specific degree... more
ABSTRACT Distributed cryptographic file systems enable file sharing among their users and need the adoption of a key management scheme for the distribution of the cryptographic keys to authorized users according to their specific degree of trust. In this paper we describe the architecture of a basic secure file sharing facility relying on a multi-party threshold-based key-sharing scheme that can be overlaid on top of the existing stackable networked file systems, and discuss its application to the implementation of distributed cryptographic file systems. It provides flexible access control policies supporting multiple combination of roles and trust profiles. A proof of concept prototype implementation within the Linux operating system framework demonstrated its effectiveness in terms of performance and security robustness.
Research Interests:
Research Interests:
Industrial assistive systems result from a multidisciplinary effort that integrates IoT (and Industrial IoT), Cognetics, and Artificial Intelligence. This paper evaluates the Prediction by Partial Matching algorithm as a component of an... more
Industrial assistive systems result from a multidisciplinary effort that integrates IoT (and Industrial IoT), Cognetics, and Artificial Intelligence. This paper evaluates the Prediction by Partial Matching algorithm as a component of an assembly assistance system that supports factory workers, by providing choices for the next manufacturing step. The evaluation of the proposed method was performed on datasets collected within an experiment involving trainees and experienced workers. The goal is to find out which method best suits the datasets in order to be integrated afterwards into our context-aware assistance system. The obtained results show that the Prediction by Partial Matching method presents a significant improvement with respect to the existing Markov predictors.
Research Interests:
Research Interests:
ABSTRACT In modern optical networks, infrastructure management is faced with the challenge of using expensive equipment and communication resources as efficiently as possible. This now includes keeping power consumption costs at a minimum... more
ABSTRACT In modern optical networks, infrastructure management is faced with the challenge of using expensive equipment and communication resources as efficiently as possible. This now includes keeping power consumption costs at a minimum and using the available optical links in a balanced way, in addition to the traditional goals of providing the best possible performance to the end customers while meeting their quality requirements. Accordingly, this paper presents a heuristic single-step lightpath routing and wavelength assignment algorithm, handling online dynamic connection requests within a fully distributed network control plane. By using shortest path routing, the presented scheme determines the best compromise solution between the users' and carrier's objectives. The former can be mainly expressed in terms of connection QoS requirements, while the latter comprises network engineering (distributing the load in order to achieve near-optimum resource usage) and containing energy consumption. This approach is able to find, in a polynomial computing time, a multiobjective optimization solution that maximizes the carriers' return of investment and supports a high number of users' request while drastically reducing the network operational expenditures, as extensively demonstrated through a simulation.
ABSTRACT Federated cloud organizations, spanning across multiple networked sites that provide both computing and storage resources, can be considered the state-of-the-art solutions for providing multi-tenant runtime services in modern... more
ABSTRACT Federated cloud organizations, spanning across multiple networked sites that provide both computing and storage resources, can be considered the state-of-the-art solutions for providing multi-tenant runtime services in modern distributed processing environments. In these scenarios, by re-optimizing the communication paths between virtual machines and big data sources, at evenly spaced interval or when required by circumstances, the overall communication and runtime resource utilization on the cloud infrastructure is re-balanced, so that more virtual machines can be allowed to access the needed big data sources with adequate bandwidth, thereby significantly improving the perceived performance and quality of service. The problem of re-optimization is tackled with a powerful meta-heuristic, the greedy randomized adaptive search procedure (GRASP), augmented by path re-linking. In order to evaluate the proposed approach, extensive simulations have been performed, leading to very interesting results, demonstrating the effectiveness and validity of the underlying ideas and their applicability to real large-scale federated cloud scenarios.
Research Interests:
Research Interests:
... Aniello Castiglione ∗ , Alfredo De Santis Dipartimento di Informatica Universit`a degli Studi di Salerno I-84084 Fisciano (SA), Italy [email protected] ∗ , [email protected] ... Initially formulated in [2] it involves two... more
... Aniello Castiglione ∗ , Alfredo De Santis Dipartimento di Informatica Universit`a degli Studi di Salerno I-84084 Fisciano (SA), Italy [email protected] ∗ , [email protected] ... Initially formulated in [2] it involves two prisoners, Alice and Bob, as well as a warden named Wendy. ...
Research Interests:
... In situations where transit routing is used [27], internal traffic between mobile nodes may even cross the network border. ... To contain or at least mitigate the impact and spread of these attack “vectors”, wireless access control... more
... In situations where transit routing is used [27], internal traffic between mobile nodes may even cross the network border. ... To contain or at least mitigate the impact and spread of these attack “vectors”, wireless access control environments must be able to examine and evaluate ...
Research Interests:
ABSTRACT Despite the wide deployment of advanced wireless coverage infrastructures, finding the best way for achieving secure mobile communication in every-day's life activities is still an open question. Indeed, a large number of... more
ABSTRACT Despite the wide deployment of advanced wireless coverage infrastructures, finding the best way for achieving secure mobile communication in every-day's life activities is still an open question. Indeed, a large number of mobile terminals, supporting multiple networking technologies, may be used to manage data from everywhere and at anytime. However, the effort required for achieving security, given the complexity of cryptographic algorithms, heavily affects the power consumption of terminals. Such energy demand, together with the one required to manage communication activities, makes energy-efficient secure communication among hardware-constrained handheld devices a challenging topic.