If you are interested in the topics below, you can contact Savio Sciancalepore (s.sciancalepore * tue.nl (replace * with @) ). You can also check some recent publications at ssciancalepore.win.tue.nl
Privacy-Enhancing Technologies (PETS) for Internet of Things (IoT) Deployments Thanks to the increasing capability of embedding powerful microcontrollers, modern IoT devices are equipped with even more computational capabilities, getting slowly closer to IT deployments in terms of processing resources. However, two main limitations still stand: (i) many IoT devices, especially mobile ones, feature batteries with limited energy availability, requiring the devices to save energy as much as possible to achieve the planned operations while maximizing lifetime; and (ii) many IoT devices might operate unattended, even for short time periods. Therefore, adversaries active in the field may have the opportunity to physically capture such devices and access their contents, posing confidentiality and privacy issues. To mitigate such threats, our team at TU/e works on integrating PETS onboard various IoT devices. The integration presents various challenges, due to the limitations still existing in the computational capabilities of the devices, the peculiar nature of the Operating Systems (OS) onboard, and the energy limitations, requiring us either to adapt existing PETS to the specific use cases or to come up with new, ad-hoc solutions for the domain.
Physical-Layer Security in Internet of Things (IoT) Networks. Physical-layer security (PLS) approaches leverage intrinsic characteristics of the devices or of their transmitted signals to provide various security services, such as authentication, spoofing detection, and jamming detection, to name a few. Such approaches require no cryptography operations from the involved devices, thus being very useful in contexts where such devices cannot afford to run expensive cryptography techniques, e.g., constrained IoT networks. Also, PLS approaches require no modifications to the transmitters, as they can use unencrypted and opportunistic signals emitted by the target devices. Thus, PLS approaches are also useful in contexts where modifying the transmitter is hard, e.g., for some specific IoT deployments or in satellite networks. At the same time, deploying PLS approaches in the wild requires dealing with a large variety of undesired side effects, e.g., the movements of the involved devices, variable noise affecting the communication channel, and temporal phenomena. Our team at TU/e works on improving the robustness of PLS approaches when deployed in the real world, so as to mitigate and overcome issues due to real-world operating conditions.