Search For:

Displaying 1-14 out of 14 total
United We Stand: Intrusion Resilience in Mobile Unattended WSNs
Found in: IEEE Transactions on Mobile Computing
By Roberto Di Pietro,Gabriele Oligeri,Claudio Soriente,Gene Tsudik
Issue Date:July 2013
pp. 1456-1468
Wireless Sensor Networks (WSNs) are susceptible to a wide range of attacks due to their distributed nature, limited sensor resources, and lack of tamper resistance. Once a sensor is corrupted, the adversary learns all secrets. Thereafter, most security mea...
 
StreamCloud: An Elastic and Scalable Data Streaming System
Found in: IEEE Transactions on Parallel and Distributed Systems
By Vincenzo Gulisano,Ricardo Jiménez-Peris,Marta Patiño-Martínez,Claudio Soriente,Patrick Valduriez
Issue Date:December 2012
pp. 2351-2365
Many applications in several domains such as telecommunications, network security, large-scale sensor networks, require online processing of continuous data flows. They produce very high loads that requires aggregating the processing capacity of many nodes...
 
Building Trust for lambda-Congenial Secret Groups
Found in: Broadband, Wireless Computing, Communication and Applications, International Conference on
By Di Ma,Claudio Soriente
Issue Date:October 2011
pp. 222-229
Establishing trust while preserving privacy is a challenging research problem. In this paper we introduce lambda -congenial secret groups which allow users to recognize trusted partners based on common attributes while preserving their anonymity and privac...
 
Securing Mobile Unattended WSNs against a Mobile Adversary
Found in: Reliable Distributed Systems, IEEE Symposium on
By Roberto Di Pietro, Gabriele Oligeri, Claudio Soriente, Gene Tsudik
Issue Date:November 2010
pp. 11-20
One important factor complicating security in Wireless Sensor Networks (WSNs) is lack of inexpensive tamper-resistant hardware in commodity sensors. Once an adversary compromises a sensor, all memory and forms of storage become exposed, along with all secr...
 
CReW: Cloud Resilience for Windows Guests through Monitored Virtualization
Found in: Reliable Distributed Systems, IEEE Symposium on
By Flavio Lombardi, Roberto Di Pietro, Claudio Soriente
Issue Date:November 2010
pp. 338-342
Clouds are complex systems subject to an increasing number of anomalies and threats. In this paper we briefly revisit the issues related to Windows guest cloud service resilience and later provide some preliminary results on the resilience of Windows cloud...
 
Data Security in Unattended Wireless Sensor Networks
Found in: IEEE Transactions on Computers
By Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik
Issue Date:November 2009
pp. 1500-1511
In recent years, Wireless Sensor Networks (WSNs) have been a very popular research topic, offering a treasure trove of systems, networking, hardware, security, and application-related problems. Much of prior research assumes that the WSN is supervised by a...
 
POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks
Found in: Reliable Distributed Systems, IEEE Symposium on
By Roberto Di Pietro, Di Ma, Claudio Soriente, Gene Tsudik
Issue Date:October 2008
pp. 185-194
Unattended Wireless Sensor Networks (UWSNs) are composed of many small resource-constrained devices and operate autonomously, gathering data which is periodically collected by a visiting sink. Unattended mode of operation, deployment in hostile environment...
 
Catch Me (If You Can): Data Survival in Unattended Sensor Networks
Found in: Pervasive Computing and Communications, IEEE International Conference on
By Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik
Issue Date:March 2008
pp. 185-194
Unattended sensor networks operating in hostile environments might collect data that represents a high-value target for the adversary.The unattended sensor's inability to off-load -- in real time -- sensitive data to a safe external entity makes it easy fo...
 
Modified Original Smart Cards and Smart Card Clone Countermeasures
Found in: Computational Intelligence and Security, International Conference on
By Alfredo De Santis, Claudio Soriente
Issue Date:December 2007
pp. 878-882
Conditional Access Systems are used in Pay-Tv Sys- tems to ensure conditional access to broadcasted data and charge subscribers a subscription fee. Smart cards are end- user security devices to store subscribers entitlements, re- quired to access data. On ...
 
PEUC-WiN: Privacy Enhancement by User Cooperation in Wireless Networks
Found in: IEEE Workshop on Secure Network Protocols
By Karim Defrawy, Claudio Soriente
Issue Date:November 2006
pp. 38-43
Location awareness capabilities of today's wireless networks provide position tailored services but, at the same time, impose serious privacy implications for the wireless users. Interface identifiers allow an adversary to trace a user's movement and locat...
 
Secure enrollment and practical migration for mobile trusted execution environments
Found in: Proceedings of the Third ACM workshop on Security and privacy in smartphones & mobile devices (SPSM '13)
By Nikolaos Karapanos, Claudio Marforio, Claudio Soriente, Kari Kostiainen, Srdjan Capkun
Issue Date:November 2013
pp. 93-98
Smartphones can implement various security services from mobile banking to security tokens used for physical access control. System-wide trusted execution environments (TEEs), like ARM TrustZone, allow implementation of these services that withstand malwar...
     
Self-healing in unattended wireless sensor networks
Found in: ACM Transactions on Sensor Networks (TOSN)
By Claudio Soriente, Di Ma, Gene Tsudik, Roberto Di Pietro
Issue Date:November 2012
pp. 1-21
Wireless sensor networks (WSNs) appeal to a wide range of applications that involve the monitoring of various physical phenomena. However, WSNs are subject to many threats. In particular, lack of pervasive tamper-resistant hardware results in sensors being...
     
Short paper: PEPSI---privacy-enhanced participatory sensing infrastructure
Found in: Proceedings of the fourth ACM conference on Wireless network security (WiSec '11)
By Claudio Soriente, Emiliano De Cristofaro
Issue Date:June 2011
pp. 23-28
Participatory Sensing combines the ubiquity of mobile phones with the sensing capabilities of Wireless Sensor Networks. It targets the pervasive collection of information, e.g., temperature, traffic conditions, or medical data. Users produce measurements f...
     
Collaborative authentication in unattended WSNs
Found in: Proceedings of the second ACM conference on Wireless network security (WiSec '09)
By Angelo Spognardi, Claudio Soriente, Gene Tsudik, Roberto Di Pietro
Issue Date:March 2009
pp. 1-24
An unattended wireless sensor network (UWSN) might collect valuable data representing an attractive target for the adversary. Since a sink visits the network infrequently, unattended sensors cannot immediately off-load data to some safe external entity. Wi...
     
 1