Sabrina Sicari

Learn More
1570-8705/$ see front matter 2012 Elsevier B.V ⇑ Corresponding author. Tel.: +39 0461 40 84 00; fa E-mail addresses: daniele.miorandi@create-ne (S. Sicari), francesco.dep org (F. De Pellegrini), imrich.chlamtac@create-net.or The term ‘‘Internet-of-Things’’ is used as an umbrella(More)
Internet of Things (IoT) has been a major research topic for almost a decade now, where physical objects would be interconnected as a result of convergence of various existing technologies. IoT is rapidly developing; however there are uncertainties about its security and privacy which could affect its sustainable development. This paper analyzes the(More)
Internet of Things (IoT) is characterized by heterogeneous technologies, which concur to the provisioning of innovative services in various application domains. In this scenario, the satisfaction of security and privacy requirements plays a fundamental role. Such requirements include data confidentiality and authentication, access control within the IoT(More)
End-to-end data aggregation, without degrading sensing accuracy, is a very relevant issue in Wireless Sensor Networks (WSN) that can prevent network congestion to occur. Moreover, privacy management requires that anonymity and data integrity are preserved in such networs. Unfortunately, no integrated solutions have been proposed so far, able to tackle both(More)
The ongoing revolution of Internet of Things (IoT), together with the growing diffusion of robots in many activities of every day life, makes IoT-aided robotics applications a tangible reality of our upcoming future. Accordingly, new advanced services, based on the interplay between robots and “things”, are being conceived in assisting humans. Nevertheless,(More)
Most applications of wireless sensor networks (WSNs) rely on data about the positions of sensor nodes, which are not necessarily known beforehand. Several localization approaches have been proposed but most of them omit to consider that WSNs could be deployed in adversarial settings, where hostile nodes under the control of an attacker coexist with faithful(More)
Security and privacy issues in healthcare data management play a fundamental role in the widespread adoption of medical information systems. As a consequence, it is very important to define the right means for expressing and managing policies in order to comply with privacy-related standards and regulations. In this work, we extend an open source hospital(More)
Over recent years, the continuous interest in <i>wireless sensor networks</i> (WSNs) has led to the appearance of new modeling methods and simulation environments for WSN applications. A broad variety of different simulation tools have been designed to explore and validate WSN systems before actual implementation and real-world deployment. These tools(More)
A family of murine anti-p-azophenylarsonate (Ars) antibodies share a variable (V) region serologically defined marker, the 36-60 idiotype (Id36-60). Most mouse strains possess five genes highly homologous to the gene encoding the heavy (H) chain V region of antibodies bearing Id36-60 (VH36-60); however, only one of these genes is ever utilized by hybridomas(More)
This paper discusses how information about the architecture and the vulnerabilities affecting a distributed system can be used to quantitatively assess the risk to which the system is exposed. Our approach to risk evaluation can be used to assess how much one should believe in system trustworthiness and to compare different solutions, providing a tool for(More)