master-projects-sciancalepore
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
master-projects-sciancalepore [2023/09/06 12:31] – ggankhuyag | master-projects-sciancalepore [2023/09/06 12:59] (current) – ggankhuyag | ||
---|---|---|---|
Line 3: | Line 3: | ||
If you are interested in the topics below, you can contact Savio Sciancalepore (s.sciancalepore * tue.nl (replace * with @) ). You can also check some recent publications at ssciancalepore.win.tue.nl | If you are interested in the topics below, you can contact Savio Sciancalepore (s.sciancalepore * tue.nl (replace * with @) ). You can also check some recent publications at ssciancalepore.win.tue.nl | ||
- | - **Privacy-Enhancing Technologies (PETS) for Internet of Things (IoT) Deployments** | + | **Privacy-Enhancing Technologies (PETS) for Internet of Things (IoT) Deployments** |
Thanks to the increasing capability of embedding powerful microcontrollers, | Thanks to the increasing capability of embedding powerful microcontrollers, | ||
To mitigate such threats, our team at TU/e works on integrating PETS onboard various IoT devices. The integration presents various challenges, due to the limitations still existing in the computational capabilities of the devices, the peculiar nature of the Operating Systems (OS) onboard, and the energy limitations, | To mitigate such threats, our team at TU/e works on integrating PETS onboard various IoT devices. The integration presents various challenges, due to the limitations still existing in the computational capabilities of the devices, the peculiar nature of the Operating Systems (OS) onboard, and the energy limitations, | ||
- | Reference Papers: | ||
- | [1] George, Dominik Roy, Savio Sciancalepore, | ||
- | [2] Sciancalepore, | ||
- | | + | Reference Papers: |
+ | | ||
+ | - Sciancalepore, | ||
+ | |||
+ | **Physical-Layer Security in Internet of Things (IoT) Networks**. | ||
Physical-layer security (PLS) approaches leverage intrinsic characteristics of the devices or of their transmitted signals to provide various security services, such as authentication, | Physical-layer security (PLS) approaches leverage intrinsic characteristics of the devices or of their transmitted signals to provide various security services, such as authentication, | ||
At the same time, deploying PLS approaches in the wild requires dealing with a large variety of undesired side effects, e.g., the movements of the involved devices, variable noise affecting the communication channel, and temporal phenomena. Our team at TU/e works on improving the robustness of PLS approaches when deployed in the real world, so as to mitigate and overcome issues due to real-world operating conditions. | At the same time, deploying PLS approaches in the wild requires dealing with a large variety of undesired side effects, e.g., the movements of the involved devices, variable noise affecting the communication channel, and temporal phenomena. Our team at TU/e works on improving the robustness of PLS approaches when deployed in the real world, so as to mitigate and overcome issues due to real-world operating conditions. | ||
+ | |||
Reference Papers: | Reference Papers: | ||
- | [3] Oligeri, G., Sciancalepore, | + | - Oligeri, G., Sciancalepore, |
- | [4] Alhazbi, Saeif, Savio Sciancalepore, | + | - Alhazbi, Saeif, Savio Sciancalepore, |
master-projects-sciancalepore.1693996288.txt.gz · Last modified: 2023/09/06 12:31 by ggankhuyag