Skip to main content

Showing 1–6 of 6 results for author: Feraudo, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.01301  [pdf, other

    cs.NI

    Controlling Communications Quality in V2V Platooning: a TSN-like Slot-Based Scheduler Approach

    Authors: Angelo Feraudo, Andrea Garbugli, Paolo Bellavista

    Abstract: Connected vehicles, facilitated by Vehicle-to-Vehicle (V2V) communications, play a key role in enhancing road safety and traffic efficiency. However, V2V communications primarily rely on wireless protocols, such as Wi-Fi, that require additional collision avoidance mechanisms to better ensure bounded latency and reliability in critical scenarios. In this paper, we introduce a novel approach to add… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

    Comments: 8 pages, WIP

  2. A Novel OMNeT++-based Simulation Tool for Vehicular Cloud Computing in ETSI MEC-compliant 5G Environments

    Authors: Angelo Feraudo, Alessandro Calvio, Paolo Bellavista

    Abstract: Vehicular cloud computing is gaining popularity thanks to the rapid advancements in next generation wireless communication networks. Similarly, Edge Computing, along with its standard proposals such as European Telecommunications Standards Institute (ETSI) Multi-access Edge Computing (MEC), will play a vital role in these scenarios, by enabling the execution of cloud-based services at the edge of… ▽ More

    Submitted 9 January, 2024; originally announced January 2024.

    Journal ref: Proceedings of the 13th International Conference on Simulation and Modeling Methodologies, Technologies and Applications - SIMULTECH (2023); SciTePress, pages 448-455

  3. arXiv:2305.02186  [pdf, other

    cs.NI cs.CR

    Mitigating IoT Botnet DDos Attacks through MUD and eBPF based Traffic Filtering

    Authors: Angelo Feraudo, Diana Andreea Popescu, Poonam Yadav, Richard Mortier, Paolo Bellavista

    Abstract: As the prevalence of Internet-of-Things (IoT) devices becomes more and more dominant, so too do the associated management and security challenges. One such challenge is the exploitation of vulnerable devices for recruitment into botnets, which can be used to carry out Distributed Denial-of-Service (DDoS) attacks. The recent Manufacturer Usage Description (MUD) standard has been proposed as a way t… ▽ More

    Submitted 3 May, 2023; originally announced May 2023.

    Comments: 12 pages, 10 figures, in review currently

  4. arXiv:2303.15836  [pdf, other

    cs.NI

    A Novel Design for Advanced 5G Deployment Environments with Virtualized Resources at Vehicular and MEC Nodes

    Authors: Angelo Feraudo, Alessando Calvio, Armir Bujari, Paolo Bellavista

    Abstract: IoT and edge computing are profoundly changing the information era, bringing a hyper-connected and context-aware computing environment to reality. Connected vehicles are a critical outcome of this synergy, allowing for the seamless interconnection of autonomous mobile/fixed objects, giving rise to a decentralized vehicle-to-everything (V2X) paradigm. On this front, the European Telecommunications… ▽ More

    Submitted 28 March, 2023; originally announced March 2023.

  5. arXiv:2010.08466  [pdf, other

    cs.NI cs.CR

    Position paper: A systematic framework for categorising IoT device fingerprinting mechanisms

    Authors: Poonam Yadav, Angelo Feraudo, Budi Arief, Siamak F. Shahandashti, Vassilios G. Vassilakis

    Abstract: The popularity of the Internet of Things (IoT) devices makes it increasingly important to be able to fingerprint them, for example in order to detect if there are misbehaving or even malicious IoT devices in one's network. The aim of this paper is to provide a systematic categorisation of machine learning augmented techniques that can be used for fingerprinting IoT devices. This can serve as a bas… ▽ More

    Submitted 19 October, 2020; v1 submitted 16 October, 2020; originally announced October 2020.

    Comments: 7 pages, 2 figures, Accepted in ACM/IEEE AIChallengeIoT 2020

  6. arXiv:2004.08003  [pdf, other

    cs.NI cs.DC

    SoK: Beyond IoT MUD Deployments -- Challenges and Future Directions

    Authors: Angelo Feraudo, Poonam Yadav, Richard Mortier, Paolo Bellavista, Jon Crowcroft

    Abstract: Due to the advancement of IoT devices in both domestic and industrial environments, the need to incorporate a mechanism to build accountability in the IoT ecosystem is paramount. In the last few years, various initiatives have been started in this direction addressing many socio-technical concerns and challenges to build an accountable system. The solution that has received a lot of attention in b… ▽ More

    Submitted 22 April, 2020; v1 submitted 16 April, 2020; originally announced April 2020.

    Comments: 7 pages, 5 figures, WIP

    ACM Class: C.2.1; C.2.3; C.2.6; C.2