Publications by authors named "Laura Pierucci"

Reconfigurable intelligent surfaces (RIS) are considered of paramount importance to improve air-ground and THz communications performance for 6G systems. Recently, RISs were proposed in Physical Layer Security (PLS), as they can (i) improve the secrecy capacity due to the controlled directional reflections' capability of RIS elements and (ii) avoid potential eavesdroppers, redirecting data streams towards the intended users. This paper proposes the integration of a multi-RISs system within a Software Defined Networking (SDN) architecture to provide a specific control layer for secure data flows forwarding.

View Article and Find Full Text PDF

The foundation of an energy sustainable Web of Industrial Things (WoIT) is facing several open issues due to the constraints imposed by the involved devices, the technological heterogeneity and the complex interactions and, hence, communications patterns. Towards this goal, in this paper, a general framework inspired by the Publish-Subscribe principle have been proposed, in order to jointly optimize the service requirements and the network availability. In particular, in this paper we focus on a holistic design with the objective to manage power budget distribution, in order to support applications that extend the basic publish-and-subscribe scheme.

View Article and Find Full Text PDF

The upcoming fifth generation (5G) wireless networks making use of higher-frequency spectrum bands suffer from serious propagation issues due to high path loss and beam directivity requirements. This promotes the device-to-device communications to boost the transmission reliability at the network edges, providing remarkable benefits in terms of the energy and spectrum efficiency, essential for a wide class of sensors networks and Internet-of-Things. More in general, applications where devices are usually constrained in computational and transmission range capabilities.

View Article and Find Full Text PDF

The Internet of Things (IoT) context brings new security issues due to billions of smart end-devices both interconnected in wireless networks and connected to the Internet by using different technologies. In this paper, we propose an attack-detection method, named Data Intrusion Detection System (DataIDS), based on real-time data analysis. As end devices are mainly resource constrained, Fog Computing (FC) is introduced to implement the DataIDS.

View Article and Find Full Text PDF