Skip to main content

Showing 1–9 of 9 results for author: Soderi, S

Searching in archive cs. Search in all archives.
.
  1. Mitigating and Analysis of Memory Usage Attack in IoE System

    Authors: Zainab Alwaisi, Simone Soderi, Rocco De Nicola

    Abstract: Internet of Everything (IoE) is a newly emerging trend, especially in homes. Marketing forces toward smart homes are also accelerating the spread of IoE devices in households. An obvious risk of the rapid adoption of these smart devices is that many lack controls for protecting the privacy and security of end users from attacks designed to disrupt lives and incur financial losses. Today the smart… ▽ More

    Submitted 30 April, 2024; originally announced April 2024.

    Journal ref: Industrial Networks and Intelligent Systems,2023

  2. Detection of Energy Consumption Cyber Attacks on Smart Devices

    Authors: Zainab Alwaisi, Simone Soderi, Rocco De Nicola

    Abstract: With the rapid development of Internet of Things (IoT) technology, intelligent systems are increasingly integrating into everyday life and people's homes. However, the proliferation of these technologies raises concerns about the security of smart home devices. These devices often face resource constraints and may connect to unreliable networks, posing risks to the data they handle. Securing IoT t… ▽ More

    Submitted 30 April, 2024; originally announced April 2024.

    Journal ref: Springer Nature Switzerland,2023

  3. Energy Cyber Attacks to Smart Healthcare Devices: A Testbed

    Authors: Zainab Alwaisi, Simone Soderi, Rocco De Nicola

    Abstract: The Internet of Things (IoT) has garnered significant interest in both research and industry due to its profound impact on human life. The rapid expansion of IoT technology has ushered in smart healthcare, smart devices, smart cities, and smart grids. However, the security of IoT devices, particularly in healthcare, has become a major concern, with recent attacks revealing serious vulnerabilities.… ▽ More

    Submitted 30 April, 2024; originally announced April 2024.

    Journal ref: Bio-inspired Information and Communications Technologies, 2023

  4. Securing Hybrid Wireless Body Area Networks (HyWBAN): Advancements in Semantic Communications and Jamming Techniques

    Authors: Simone Soderi, Mariella Särestöniemi, Syifaul Fuada, Matti Hämäläinen, Marcos Katz, Jari Iinatti

    Abstract: This paper explores novel strategies to strengthen the security of Hybrid Wireless Body Area Networks (HyWBANs), essential in smart healthcare and Internet of Things (IoT) applications. Recognizing the vulnerability of HyWBAN to sophisticated cyber-attacks, we propose an innovative combination of semantic communications and jamming receivers. This dual-layered security mechanism protects against u… ▽ More

    Submitted 24 April, 2024; originally announced April 2024.

    Journal ref: Digital Health and Wireless Solutions, 2024

  5. Cybersecurity Assessment of the Polar Bluetooth Low Energy Heart-rate Sensor

    Authors: Smone Soderi

    Abstract: Wireless communications among wearable and implantable devices implement the information exchange around the human body. Wireless body area network (WBAN) technology enables non-invasive applications in our daily lives. Wireless connected devices improve the quality of many services, and they make procedures easier. On the other hand, they open up large attack surfaces and introduces potential sec… ▽ More

    Submitted 24 April, 2024; originally announced April 2024.

    Comments: Body Area Networks: Smart IoT and Big Data for Intelligent Health Management, 2019

  6. CONNECTION: COvert chaNnel NEtwork attaCk Through bIt-rate mOdulatioN

    Authors: Simone Soderi, Rocco De Nicola

    Abstract: Covert channel networks are a well-known method for circumventing the security measures organizations put in place to protect their networks from adversarial attacks. This paper introduces a novel method based on bit-rate modulation for implementing covert channels between devices connected over a wide area network. This attack can be exploited to exfiltrate sensitive information from a machine (i… ▽ More

    Submitted 24 April, 2024; originally announced April 2024.

    Journal ref: Emerging Information Security and Applications, 2024

  7. Railway cyber-security in the era of interconnected systems: a survey

    Authors: Simone Soderi, Daniele Masti, Yuriy Zacchia Lun

    Abstract: Technological advances in the telecommunications industry have brought significant advantages in the management and performance of communication networks. The railway industry is among the ones that have benefited the most. These interconnected systems, however, have a wide area exposed to cyberattacks. This survey examines the cybersecurity aspects of railway systems by considering the standards,… ▽ More

    Submitted 15 May, 2023; v1 submitted 27 July, 2022; originally announced July 2022.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

    Journal ref: IEEE Transactions on Intelligent Transportation Systems, 2023

  8. VLC Physical Layer Security through RIS-aided Jamming Receiver for 6G Wireless Networks

    Authors: Simone Soderi, Alessandro Brighente, Federico Turrin, Mauro Conti

    Abstract: Visible Light Communication (VLC) is one the most promising enabling technology for future 6G networks to overcome Radio-Frequency (RF)-based communication limitations thanks to a broader bandwidth, higher data rate, and greater efficiency. However, from the security perspective, VLCs suffer from all known wireless communication security threats (e.g., eavesdropping and integrity attacks). For thi… ▽ More

    Submitted 7 June, 2022; v1 submitted 18 May, 2022; originally announced May 2022.

    Journal ref: 2022 19th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)

  9. Turning Federated Learning Systems Into Covert Channels

    Authors: Gabriele Costa, Fabio Pinelli, Simone Soderi, Gabriele Tolomei

    Abstract: Federated learning (FL) goes beyond traditional, centralized machine learning by distributing model training among a large collection of edge clients. These clients cooperatively train a global, e.g., cloud-hosted, model without disclosing their local, private training data. The global model is then shared among all the participants which use it for local predictions. In this paper, we put forward… ▽ More

    Submitted 23 February, 2024; v1 submitted 21 April, 2021; originally announced April 2021.

    Journal ref: IEEE Access, vol. 10, pp. 130642-130656, 2022