Search results for "Telecomunicazioni"
showing 10 items of 246 documents
Rings for Privacy: an Architecture for Large Scale Privacy-Preserving Data Mining
2021
This article proposes a new architecture for privacy-preserving data mining based on Multi Party Computation (MPC) and secure sums. While traditional MPC approaches rely on a small number of aggregation peers replacing a centralized trusted entity, the current study puts forth a distributed solution that involves all data sources in the aggregation process, with the help of a single server for storing intermediate results. A large-scale scenario is examined and the possibility that data become inaccessible during the aggregation process is considered, a possibility that traditional schemes often neglect. Here, it is explicitly examined, as it might be provoked by intermittent network connec…
Enhancing tracking performance in a smartphone-based navigation system for visually impaired people
2016
In this paper we show how to enhance the tracking performance of Arianna, a low-cost augmented reality system designed to meet the needs of people with problems of orientation, people with sight impairment and blind people. For augmented reality system we mean the design of: i) a set of paths and tags to be deployed in the environment, realized in various ways depending on the context (decorative elements easily identifiable, colorful stripes, QR code, RFID, etc.); ii) an instrument of mediation between the reality and the user (typically a smartphone) to access the information disseminated in the environment by means of a camera and provide a vibration feedback signal to the users for foll…
Location-Aware MAC Scheduling in Industrial-Like Environment
2018
We consider an environment strongly affected by the presence of metallic objects, that can be considered representative of an indoor industrial environment with metal obstacles. This scenario is a very harsh environment where radio communication has notorious difficulties, as metallic objects create a strong blockage component and surfaces are highly reflective. In this environment, we investigate how to dynamically allocate MAC resources in time to static and mobile users based on context awareness extracted from a legacy WiFi positioning system. In order to address this problem, we integrate our WiFi ranging and positioning system in the WiSHFUL architecture and then define a hypothesis t…
Modeling Energy Demand Aggregators for Residential Consumers
2013
International audience; Energy demand aggregators are new actors in the energy scenario: they gather a group of energy consumers and implement a demand- response paradigm. When the energy provider needs to reduce the current energy demand on the grid, it can pay the energy demand aggregator to reduce the load by turning off some of its consumers loads or postponing their activation. Currently this operation involves only greedy energy consumers like industrial plants. In this paper we want to study the potential of aggregating a large number of small energy consumers like home users as it may happen in smart grids. In particular we want to address the feasibility of such approach by conside…
Self-validating bundles for flexible data access control
2016
Modern cloud-based services offer free or low-cost content sharing with significant advantages for the users but also new issues in privacy and security. To protect sensitive contents (i.e., copyrighted, top secret, and personal data) from the unauthorized access, sophisticated access management systems or/and decryption schemes have been proposed, generally based on trusted applications at client side. These applications work also as access controllers, verifying specific permissions and restrictions accessing user’s resources. We propose secure bundles (S-bundles), which encapsulate a behavioral model (provided as bytecode) to define versatile stand-alone access controllers and encoding/d…
A Clustering approach for profiling LoRaWAN IoT devices
2019
Internet of Things (IoT) devices are starting to play a predominant role in our everyday life. Application systems like Amazon Echo and Google Home allow IoT devices to answer human requests, or trigger some alarms and perform suitable actions. In this scenario, any data information, related device and human interaction are stored in databases and can be used for future analysis and improve the system functionality. Also, IoT information related to the network level (wireless or wired) may be stored in databases and can be processed to improve the technology operation and to detect network anomalies. Acquired data can be also used for profiling operation, in order to group devices according…
A flexible and reconfigurable 5G networking architecture based on context and content information
2017
The need for massive content delivery is a consolidated trend in mobile communications, and will even increase for next years. Moreover, while 4G maturity and evolution is driven by video contents, next generation (5G) networks will be dominated by heterogeneous data and additional massive diffusion of Internet of Things (IoT). The current network architecture is not sufficient to cope with such traffic, which is heterogeneous in terms of latency and QoS requirements, and variable in space and time. This paper proposes architectural advances to endow the network with the necessary flexibility helping to adapt to these varying traffic needs by providing content and communication services whe…
A Metaheuristic Bandwidth Allocation Scheme for FiWi Networks Using Ant Colony Optimization
2015
Optical-wireless access networks constitute a quite attractive solution to meet the ever-increasing bandwidth requirements of end-users, offering significant benefits such as ubiquitous coverage in the wireless domain and huge bandwidth in the optical domain. However, converging optical and wireless networking technologies, with Passive Optical Networks (PONs) and 4G wireless standards, such as the Worldwide Interoperability for Microwave Access (WiMAX) and the Long Term Evolution (LTE), entails major challenges that need to be addressed. In this context, designing an efficient and fair bandwidth distribution with Quality of Service (QoS) support is a difficult task due to the interdependen…
Utility-based resource allocations in multi-hop wireless networks
2011
It is well known that CSMA (Carrier Sense Multiple Access) protocols exhibit very poor performance in case of multi-hop transmissions, because of inter-link interference due to imperfect carrier sensing. Since ad-hoc networks based on multihop packet deliveries are becoming more and more common in different application and networking scenarios, different medium access control extensions are currently considered for improving the channel utilization efficiency. In this paper, we propose a simple approach based on preallocating temporal slots in which different sets of nodes are allowed to contend for the channel access, which can significantly improve CSMA performance with limited signaling …
Error-Based Interference Detection in WiFi Networks
2017
In this paper we show that inter-technology interference can be recognized by commodity WiFi devices by monitoring the statistics of receiver errors. Indeed, while for WiFi standard frames the error probability varies during the frame reception in different frame fields (PHY, MAC headers, payloads) protected with heterogeneous coding, errors may appear randomly at any point during the time the demodulator is trying to receive an exogenous interfering signal. We thus detect and identify cross-technology interference on off-the-shelf WiFi cards by monitoring the sequence of receiver errors (bad PLCP, bad PCS, invalid headers, etc.) and develop an Artificial Neural Network (ANN) to recognize t…