Topic: IoT

Published:

# Topic: IoT

Internet of thing (IOT) Internet of thing (IoTs) Internet of things IoT IoV ISP Smart city Smart pervasive application

2026

  1. Campanile, L., Di Bonito, L. P., Marulli, F., Balzanella, A., & Verde, R. (2026). Toward Privacy-Aware Environmental Monitoring of CO2 and Air Pollutants in Southern Italy [Conference paper]. Lecture Notes in Computer Science, 15893 LNCS, 317–333. https://doi.org/10.1007/978-3-031-97645-2_21
    Abstract
    The increasing levels of CO2 and air pollutants represent a major challenge to environmental sustainability and public health, particularly in regions characterized by complex geographic and socio-economic dynamics. This work proposes a study focused on the Southern Italy regions, where environmental vulnerabilities are displayed, along with a limited availability of high-granularity data. The main aim of this work is to build and provide a comprehensive and detailed dataset tailored to the region’s unique needs, by leveraging datasets from EDGAR for greenhouse gases and air pollutants, integrated with demographic and territorial morphology data from ISTAT. The creation of composite indicators to monitor trends in emissions and pollution on a fine spatial scale is supported by the data set. These indicators enable initial insight into spatial disparities in pollutant concentrations, offering valuable data to inform targeted policy interventions. The work provided a foundation for next analytical studies, integrating different datasets and highlighting the potential for complex spatiotemporal analysis. The study provides a robust dataset and preliminary insights, enhancing the understanding of environmental dynamics in Southern Italy. Subsequent efforts will focus on extending this methodology to more extensive geographic contexts and incorporating real-time data for adaptive monitoring. The proposed framework also lays the groundwork for privacy-aware environmental monitoring solutions, enabling future integration with edge and IoT-based architectures while addressing privacy and data protection concerns. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2026.
    DOI Publisher Details
    Details

2025

  1. Campanile, L., Iacono, M., Mastroianni, M., & Riccio, C. (2025). Performance Evaluation of an Edge-Blockchain Architecture for Smart City [Conference paper]. Proceedings - European Council for Modelling and Simulation, ECMS, 2025-June, 620–627. https://doi.org/10.7148/2025-0620
    Abstract
    This paper presents a simulation-based methodology to evaluate the performance of a privacy-compliant edge-blockchain architecture for smart city environments. The proposed model combines edge computing with a private, permissioned blockchain to ensure low-latency processing, secure data management, and verifiable transactions. Using a discrete-event simulation framework, we analyze the behavior of the system under realistic workloads and time-varying traffic conditions. The model captures edge operations, including preprocessing and cryptographic tasks, as well as blockchain validation using Proof of Stake consensus. Several experiments explore saturation thresholds, resource utilization, and latency dynamics, under both synthetic and realistic traffic profiles. Results reveal how architectural bottlenecks shift depending on resource allocation and input rate, and demonstrate the importance of balanced dimensioning between edge and blockchain layers. © ECMS Marco Scarpa, Salvatore Cavalieri, Salvatore Serrano, Fabrizio De Vita (Editors) 2025.
    DOI Publisher Details
    Details

2024

  1. Barzegar, A., Campanile, L., Marrone, S., Marulli, F., Verde, L., & Mastroianni, M. (2024). Fuzzy-based Severity Evaluation in Privacy Problems: An Application to Healthcare [Conference paper]. Proceedings - 2024 19th European Dependable Computing Conference, EDCC 2024, 147–154. https://doi.org/10.1109/EDCC61798.2024.00037
    Abstract
    The growing diffusion of smart pervasive applications is starting to mine personal privacy: from Internet of Things to Machine Learning, the opportunities for privacy loss are many. As for other concerns involving people and goods as financial, safety and security, researchers and practitioners have defined in time different risk assessment procedures to have repeatable and accurate ways of detecting, quantifying and managing the (possible) source of privacy loss. This paper defines a methodology to deal with privacy risk assessment, overcoming the traditional dichotomy between qualitative (easy to apply) and quantitative (accurate) approaches. The present paper introduces an approach based on fuzzy logic, able to conjugate the benefits of both techniques. The feasibility of the proposed methodology is demonstrated using a healthcare case study. © 2024 IEEE.
    DOI Publisher Details
    Details
  2. Marulli, F., Campanile, L., Marrone, S., & Verde, L. (2024). Combining Federated and Ensemble Learning in Distributed and Cloud Environments: An Exploratory Study [Book chapter]. Lecture Notes on Data Engineering and Communications Technologies, 203, 297–306. https://doi.org/10.1007/978-3-031-57931-8_29
    Abstract
    Conventional modern Machine Learning (ML) applications involve training models in the cloud and then transferring them back to the edge, especially in an Internet of Things (IoT) enabled environment. However, privacy-related limitations on data transfer from the edge to the cloud raise challenges: among various solutions, Federated Learning (FL) could satisfy privacy related concerns and accommodate power and energy issues of edge devices. This paper proposes a novel approach that combines FL and Ensemble Learning (EL) to improve both security and privacy challenges. The presented methodology introduces an extra layer, the Federation Layer, to enhance security. It uses Bayesian Networks (BNs) to dynamically filter untrusted/unsecure federation clients. This approach presents a solution for increasing the security and robustness of FL systems, considering also privacy and performance aspects. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2024.
    DOI Publisher Details
    Details

2023

  1. Marrone, S., Campanile, L., De Fazio, R., Di Giovanni, M., Gentile, U., Marulli, F., & Verde, L. (2023). A Petri net oriented approach for advanced building energy management systems [Article]. Journal of Ambient Intelligence and Smart Environments, 15(3), 211–233. https://doi.org/10.3233/AIS-230065
    Abstract
    Sustainability is one of the main goals to pursue in several aspects of everyday life; the recent energy shortage and the price raise worsen this problem, especially in the management of energy in buildings. As the Internet of Things (IoT) is an assessed computing paradigm able to capture meaningful data from the field and send them to cloud infrastructures, other approaches are also enabled, namely model-based approaches. These methods can be used to predict functional and non-functional properties of Building Energy Management Systems (BEMS) before setting up them. This paper aims at bridging the gap between model-based approaches and physical realizations of sensing and small computing devices. Through an integrated approach, able to exploit the power of different dialects of Petri Nets, this paper proposes a methodology for the early evaluation of BEMS properties as well as the automatic generation of IoT controllers. © 2023 - IOS Press. All rights reserved.
    DOI Publisher Details
    Details
  2. Bobbio, A., Campanile, L., Gribaudo, M., Iacono, M., Marulli, F., & Mastroianni, M. (2023). A cyber warfare perspective on risks related to health IoT devices and contact tracing [Article]. Neural Computing and Applications, 35(19), 13823–13837. https://doi.org/10.1007/s00521-021-06720-1
    Abstract
    The wide use of IT resources to assess and manage the recent COVID-19 pandemic allows to increase the effectiveness of the countermeasures and the pervasiveness of monitoring and prevention. Unfortunately, the literature reports that IoT devices, a widely adopted technology for these applications, are characterized by security vulnerabilities that are difficult to manage at the state level. Comparable problems exist for related technologies that leverage smartphones, such as contact tracing applications, and non-medical health monitoring devices. In analogous situations, these vulnerabilities may be exploited in the cyber domain to overload the crisis management systems with false alarms and to interfere with the interests of target countries, with consequences on their economy and their political equilibria. In this paper we analyze the potential threat to an example subsystem to show how these influences may impact it and evaluate a possible consequence. © 2021, The Author(s), under exclusive licence to Springer-Verlag London Ltd., part of Springer Nature.
    DOI Publisher Details
    Details

2022

  1. Campanile, L., Forgione, F., Mastroianni, M., Palmiero, G., & Sanghez, C. (2022). Evaluating the Impact of Data Anonymization in a Machine Learning Application [Conference paper]. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 13380 LNCS, 389–400. https://doi.org/10.1007/978-3-031-10542-5_27
    Abstract
    The data protection impact assessment is used to verify the necessity, proportionality and risks of data processing. Our work is based on the data processed by the technical support of a Wireless Service Provider. The team of WISP tech support uses a machine learning system to predict failures. The goal of our the experiments was to evaluate the DPIA with personal data and without personal data. In fact, in a first scenario, the experiments were conducted using a machine learning application powered by non-anonymous personal data. Instead in the second scenario, the data was anonymized before feeding the machine learning system. In this article we evaluate how much the Data Protection Impact Assessment changes when moving from a scenario with raw data to a scenario with anonymized data. © 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.
    DOI Publisher Details
    Details
  2. Campanile, L., Iacono, M., Marulli, F., Gribaudo, M., & Mastroianni, M. (2022). A DSL-based modeling approach for energy harvesting IoT/WSN [Conference paper]. Proceedings - European Council for Modelling and Simulation, ECMS, 2022-May, 317–323. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85130645195&partnerID=40&md5=f2d475b445f76d3b5f49752171c0fada
    Abstract
    The diffusion of intelligent services and the push for the integration of computing systems and services in the environment in which they operate require a constant sensing activity and the acquisition of different information from the environment and the users. Health monitoring, domotics, Industry 4.0 and environmental challenges leverage the availability of cost-effective sensing solutions that allow both the creation of knowledge bases and the automatic process of them, be it with algorithmic approaches or artificial intelligence solutions. The foundation of these solutions is given by the Internet of Things (IoT), and the substanding Wireless Sensor Networks (WSN) technology stack. Of course, design approaches are needed that enable defining efficient and effective sensing infrastructures, including energy related aspects. In this paper we present a Domain Specific Language for the design of energy aware WSN IoT solutions, that allows domain experts to define sensor network models that may be then analyzed by simulation-based or analytic techniques to evaluate the effect of task allocation and offioading and energy harvesting and utilization in the network. The language has been designed to leverage the SIMTHESys modeling framework and its multiformalism modeling evaluation features. ©ECMS Ibrahim A. Hameed, Agus Hasan, Saleh Abdel-Afou Alaliyat (Editors) 2022
    Publisher Details
    Details

2021

  1. Campanile, L., Cantiello, P., Iacono, M., Marulli, F., & Mastroianni, M. (2021). Risk Analysis of a GDPR-Compliant Deletion Technique for Consortium Blockchains Based on Pseudonymization [Conference paper]. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 12956 LNCS, 3–14. https://doi.org/10.1007/978-3-030-87010-2_1
    Abstract
    Blockchains provide a valid and profitable support for the implementation of trustable and secure distributed ledgers, in support to groups of subjects that are potentially competitors in conflict of interest but need to share progressive information recording processes. Blockchains prevent data stored in blocks from being altered or deleted, but there are situations in which stored information must be deleted or made inaccessible on request or periodically, such as the ones in which GDPR is applicable. In this paper we present literature solutions and design an implementation in the context of a traffic management system for the Internet of Vehicles based on the Pseudonymization/Cryptography solution, evaluating its viability, its GDPR compliance and its level of risk. © 2021, Springer Nature Switzerland AG.
    DOI Publisher Details
    Details
  2. Campanile, L., Gribaudo, M., Iacono, M., & Mastroianni, M. (2021). Hybrid Simulation of Energy Management in IoT Edge Computing Surveillance Systems [Conference paper]. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 13104 LNCS, 345–359. https://doi.org/10.1007/978-3-030-91825-5_21
    Abstract
    Internet of Things (IoT) is a well established approach used for the implementation of surveillance systems that are suitable for monitoring large portions of territory. Current developments allow the design of battery powered IoT nodes that can communicate over the network with low energy requirements and locally perform some computing and coordination task, besides running sensing and related processing: it is thus possible to implement edge computing oriented solutions on IoT, if the design encompasses both hardware and software elements in terms of sensing, processing, computing, communications and routing energy costs as one of the quality indices of the system. In this paper we propose a modeling approach for edge computing IoT-based monitoring systems energy related characteristics, suitable for the analysis of energy levels of large battery powered monitoring systems with dynamic and reactive computing workloads. © 2021, Springer Nature Switzerland AG.
    DOI Publisher Details
    Details
  3. Campanile, L., Forgione, F., Marulli, F., Palmiero, G., & Sanghez, C. (2021). Dataset Anonimyzation for Machine Learning: An ISP Case Study [Conference paper]. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 12950 LNCS, 589–597. https://doi.org/10.1007/978-3-030-86960-1_42
    Abstract
    Internet Service Providers technical support needs personal data to predict potential anomalies. In this paper, we performed a comparative study of forecasting performance using raw data and anonymized data, in order to assess how much performance may vary, when plain personal data are replaced by anonymized personal data. © 2021, Springer Nature Switzerland AG.
    DOI Publisher Details
    Details
  4. Campanile, L., Marulli, F., Mastroianni, M., Palmiero, G., & Sanghez, C. (2021). Machine Learning-aided Automatic Calibration of Smart Thermal Cameras for Health Monitoring Applications [Conference paper]. International Conference on Internet of Things, Big Data and Security, IoTBDS - Proceedings, 2021-April, 343–353. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85137959400&partnerID=40&md5=eb78330cb4d585e500b77cd906edfbc7
    Abstract
    In this paper, we introduce a solution aiming to improve the accuracy of the surface temperature detection in an outdoor environment. The temperature sensing subsystem relies on Mobotix thermal camera without the black body, the automatic compensation subsystem relies on Raspberry Pi with Node-RED and TensorFlow 2.x. The final results showed that it is possible to automatically calibrate the camera using machine learning and that it is possible to use thermal imaging cameras even in critical conditions such as outdoors. Future development is to improve performance using computer vision techniques to rule out irrelevant measurements. © 2021 by SCITEPRESS - Science and Technology Publications, Lda.
    Publisher Details
    Details

2020

  1. Campanile, L., Iacono, M., Lotito, R., & Mastroianni, M. (2020). A WSN Energy-Aware approach for air pollution monitoring in waste treatment facility site: A case study for landfill monitoring odour [Conference paper]. IoTBDS 2020 - Proceedings of the 5th International Conference on Internet of Things, Big Data and Security, 526–532. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85089477488&partnerID=40&md5=13ea9ca38f15c5b885ef7e501067010c
    Abstract
    The gaseous emissions derived from industrial plants are generally subject to a strictly program of monitoring, both continuous or one-spot, in order to comply with the limits imposed by the permitting license. Nowadays the problem of odour emission, and the consequently nuisance generated to the nearest receptors, has acquired importance so that is frequently asked a specific implementation of the air pollution monitoring program. In this paper we studied the case study of a generic landfill for the implementation of the odour monitoring system and time-specific use of air pollution control technology. The off-site monitoring is based on the deployment of electronic nose as part of a specifically built WSN system. The nodes outside the landfill boundary do not act as a continuously monitoring stations but as sensors activated when specific conditions, inside and outside the landfill, are achieved. The WSN is then organized on an energy-aware approach so to prolong the lifetime of the entire system, with significant cost-benefit advancement, and produce a monitoring-structure that can answer to specific input like threshold overshooting. Copyright © 2020 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved.
    Publisher Details
    Details
  2. Campanile, L., Iacono, M., Marulli, F., & Mastroianni, M. (2020). Privacy regulations challenges on data-centric and iot systems: A case study for smart vehicles [Conference paper]. IoTBDS 2020 - Proceedings of the 5th International Conference on Internet of Things, Big Data and Security, 507–520. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85089476036&partnerID=40&md5=c18dd73c221ec312a330521bf03d332e
    Abstract
    Internet of Things (IoTs) services and data-centric systems allow smart and efficient information exchanging. Anyway, even if existing IoTs and cyber security architectures are enforcing, they are still vulnerable to security issues, as unauthorized access, data breaches, intrusions. They can’t provide yet sufficiently robust and secure solutions to be applied in a straightforward way, both for ensuring privacy preservation and trustworthiness of transmitted data, evenly preventing from its fraudulent and unauthorized usage. Such data potentially include critical information about persons’ privacy (locations, visited places, behaviors, goods, anagraphic data and health conditions). So, novel approaches for IoTs and data-centric security are needed. In this work, we address IoTs systems security problem focusing on the privacy preserving issue. Indeed, after the European Union introduced the General Data Protection Regulation (GDPR), privacy data protection is a mandatory requirement for systems producing and managing sensible users’ data. Starting from a case study for the Internet of Vehicles (IoVs), we performed a pilot study and DPIA assessment to analyze possible mitigation strategies for improving the compliance of IoTs based systems to GDPR requirements. Our preliminary results evidenced that the introduction of blockchains in IoTs systems architectures can improve significantly the compliance to privacy regulations. Copyright © 2020 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved.
    Publisher Details
    Details
  3. Mainenti, G., Campanile, L., Marulli, F., Ricciardi, C., & Valente, A. S. (2020). Machine learning approaches for diabetes classification: Perspectives to artificial intelligence methods updating [Conference paper]. IoTBDS 2020 - Proceedings of the 5th International Conference on Internet of Things, Big Data and Security, 533–540. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85089519717&partnerID=40&md5=bf7cc36e86c1988dd85e04c2fce06de1
    Abstract
    In recent years the application of Machine Learning (ML) and Artificial Intelligence (AI) techniques in healthcare helped clinicians to improve the management of chronic patients. Diabetes is among the most common chronic illness in the world for which often is still challenging do an early detection and a correct classification of type of diabetes to an individual. In fact it often depends on the circumstances present at the time of diagnosis, and many diabetic individuals do not easily fit into a single class. The aim is this paper is the application of ML techniques in order to classify the occurrence of different mellitus diabetes on the base of clinical data obtained from diabetic patients during the daily hospitals activities. Copyright © 2020 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved.
    Publisher Details
    Details
  4. Campanile, L., Iacono, M., Marulli, F., & Mastroianni, M. (2020). A simulation study on a WSN for emergency management [Conference paper]. Proceedings - European Council for Modelling and Simulation, ECMS, 34(1), 384–392. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85094937629&partnerID=40&md5=69ee7b771d76c72bd5012883b86e67ca
    Abstract
    Wireless Sensors Networks (WSN) are one of the ways to provide the communication infrastructure for advanced applications based on the Internet of Things (IoT) paradigm. IoT supports high level applications over WSN to provide services in a number of fields. WSN are also suitable to support critical applications, as the supporting technologies are consolidated and standard network services can be used on top of the specific layers. Furthermore, generic distributed or network-enabled software can be run over the nodes of a WSN. In this paper we evaluate and compare performances of IEEE 802.llg and 802.1 In, two implementations of the popular Wi-Fi technology, to support the deployment and utilization of an energy management support system, used to monitor the field by a team of firefighters during a mission. Evaluation on an example scenario is done by using ns-3, an open network simulator characterized by its realistic details, to understand the actual limitations of the two standards besides theoretical limits. © ECMS Mike Steglich, Christian Mueller, Gaby Neumann, Mathias Walther.
    Publisher Details
    Details

← Back to all publications

2026

  1. Campanile, L., Di Bonito, L. P., Marulli, F., Balzanella, A., & Verde, R. (2026). Toward Privacy-Aware Environmental Monitoring of CO2 and Air Pollutants in Southern Italy [Conference paper]. Lecture Notes in Computer Science, 15893 LNCS, 317–333. https://doi.org/10.1007/978-3-031-97645-2_21
    Abstract
    The increasing levels of CO2 and air pollutants represent a major challenge to environmental sustainability and public health, particularly in regions characterized by complex geographic and socio-economic dynamics. This work proposes a study focused on the Southern Italy regions, where environmental vulnerabilities are displayed, along with a limited availability of high-granularity data. The main aim of this work is to build and provide a comprehensive and detailed dataset tailored to the region’s unique needs, by leveraging datasets from EDGAR for greenhouse gases and air pollutants, integrated with demographic and territorial morphology data from ISTAT. The creation of composite indicators to monitor trends in emissions and pollution on a fine spatial scale is supported by the data set. These indicators enable initial insight into spatial disparities in pollutant concentrations, offering valuable data to inform targeted policy interventions. The work provided a foundation for next analytical studies, integrating different datasets and highlighting the potential for complex spatiotemporal analysis. The study provides a robust dataset and preliminary insights, enhancing the understanding of environmental dynamics in Southern Italy. Subsequent efforts will focus on extending this methodology to more extensive geographic contexts and incorporating real-time data for adaptive monitoring. The proposed framework also lays the groundwork for privacy-aware environmental monitoring solutions, enabling future integration with edge and IoT-based architectures while addressing privacy and data protection concerns. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2026.
    DOI Publisher Details
    Details

2025

  1. Campanile, L., Iacono, M., Mastroianni, M., & Riccio, C. (2025). Performance Evaluation of an Edge-Blockchain Architecture for Smart City [Conference paper]. Proceedings - European Council for Modelling and Simulation, ECMS, 2025-June, 620–627. https://doi.org/10.7148/2025-0620
    Abstract
    This paper presents a simulation-based methodology to evaluate the performance of a privacy-compliant edge-blockchain architecture for smart city environments. The proposed model combines edge computing with a private, permissioned blockchain to ensure low-latency processing, secure data management, and verifiable transactions. Using a discrete-event simulation framework, we analyze the behavior of the system under realistic workloads and time-varying traffic conditions. The model captures edge operations, including preprocessing and cryptographic tasks, as well as blockchain validation using Proof of Stake consensus. Several experiments explore saturation thresholds, resource utilization, and latency dynamics, under both synthetic and realistic traffic profiles. Results reveal how architectural bottlenecks shift depending on resource allocation and input rate, and demonstrate the importance of balanced dimensioning between edge and blockchain layers. © ECMS Marco Scarpa, Salvatore Cavalieri, Salvatore Serrano, Fabrizio De Vita (Editors) 2025.
    DOI Publisher Details
    Details

2024

  1. Barzegar, A., Campanile, L., Marrone, S., Marulli, F., Verde, L., & Mastroianni, M. (2024). Fuzzy-based Severity Evaluation in Privacy Problems: An Application to Healthcare [Conference paper]. Proceedings - 2024 19th European Dependable Computing Conference, EDCC 2024, 147–154. https://doi.org/10.1109/EDCC61798.2024.00037
    Abstract
    The growing diffusion of smart pervasive applications is starting to mine personal privacy: from Internet of Things to Machine Learning, the opportunities for privacy loss are many. As for other concerns involving people and goods as financial, safety and security, researchers and practitioners have defined in time different risk assessment procedures to have repeatable and accurate ways of detecting, quantifying and managing the (possible) source of privacy loss. This paper defines a methodology to deal with privacy risk assessment, overcoming the traditional dichotomy between qualitative (easy to apply) and quantitative (accurate) approaches. The present paper introduces an approach based on fuzzy logic, able to conjugate the benefits of both techniques. The feasibility of the proposed methodology is demonstrated using a healthcare case study. © 2024 IEEE.
    DOI Publisher Details
    Details
  2. Marulli, F., Campanile, L., Marrone, S., & Verde, L. (2024). Combining Federated and Ensemble Learning in Distributed and Cloud Environments: An Exploratory Study [Book chapter]. Lecture Notes on Data Engineering and Communications Technologies, 203, 297–306. https://doi.org/10.1007/978-3-031-57931-8_29
    Abstract
    Conventional modern Machine Learning (ML) applications involve training models in the cloud and then transferring them back to the edge, especially in an Internet of Things (IoT) enabled environment. However, privacy-related limitations on data transfer from the edge to the cloud raise challenges: among various solutions, Federated Learning (FL) could satisfy privacy related concerns and accommodate power and energy issues of edge devices. This paper proposes a novel approach that combines FL and Ensemble Learning (EL) to improve both security and privacy challenges. The presented methodology introduces an extra layer, the Federation Layer, to enhance security. It uses Bayesian Networks (BNs) to dynamically filter untrusted/unsecure federation clients. This approach presents a solution for increasing the security and robustness of FL systems, considering also privacy and performance aspects. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2024.
    DOI Publisher Details
    Details

2023

  1. Marrone, S., Campanile, L., De Fazio, R., Di Giovanni, M., Gentile, U., Marulli, F., & Verde, L. (2023). A Petri net oriented approach for advanced building energy management systems [Article]. Journal of Ambient Intelligence and Smart Environments, 15(3), 211–233. https://doi.org/10.3233/AIS-230065
    Abstract
    Sustainability is one of the main goals to pursue in several aspects of everyday life; the recent energy shortage and the price raise worsen this problem, especially in the management of energy in buildings. As the Internet of Things (IoT) is an assessed computing paradigm able to capture meaningful data from the field and send them to cloud infrastructures, other approaches are also enabled, namely model-based approaches. These methods can be used to predict functional and non-functional properties of Building Energy Management Systems (BEMS) before setting up them. This paper aims at bridging the gap between model-based approaches and physical realizations of sensing and small computing devices. Through an integrated approach, able to exploit the power of different dialects of Petri Nets, this paper proposes a methodology for the early evaluation of BEMS properties as well as the automatic generation of IoT controllers. © 2023 - IOS Press. All rights reserved.
    DOI Publisher Details
    Details
  2. Bobbio, A., Campanile, L., Gribaudo, M., Iacono, M., Marulli, F., & Mastroianni, M. (2023). A cyber warfare perspective on risks related to health IoT devices and contact tracing [Article]. Neural Computing and Applications, 35(19), 13823–13837. https://doi.org/10.1007/s00521-021-06720-1
    Abstract
    The wide use of IT resources to assess and manage the recent COVID-19 pandemic allows to increase the effectiveness of the countermeasures and the pervasiveness of monitoring and prevention. Unfortunately, the literature reports that IoT devices, a widely adopted technology for these applications, are characterized by security vulnerabilities that are difficult to manage at the state level. Comparable problems exist for related technologies that leverage smartphones, such as contact tracing applications, and non-medical health monitoring devices. In analogous situations, these vulnerabilities may be exploited in the cyber domain to overload the crisis management systems with false alarms and to interfere with the interests of target countries, with consequences on their economy and their political equilibria. In this paper we analyze the potential threat to an example subsystem to show how these influences may impact it and evaluate a possible consequence. © 2021, The Author(s), under exclusive licence to Springer-Verlag London Ltd., part of Springer Nature.
    DOI Publisher Details
    Details

2022

  1. Campanile, L., Forgione, F., Mastroianni, M., Palmiero, G., & Sanghez, C. (2022). Evaluating the Impact of Data Anonymization in a Machine Learning Application [Conference paper]. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 13380 LNCS, 389–400. https://doi.org/10.1007/978-3-031-10542-5_27
    Abstract
    The data protection impact assessment is used to verify the necessity, proportionality and risks of data processing. Our work is based on the data processed by the technical support of a Wireless Service Provider. The team of WISP tech support uses a machine learning system to predict failures. The goal of our the experiments was to evaluate the DPIA with personal data and without personal data. In fact, in a first scenario, the experiments were conducted using a machine learning application powered by non-anonymous personal data. Instead in the second scenario, the data was anonymized before feeding the machine learning system. In this article we evaluate how much the Data Protection Impact Assessment changes when moving from a scenario with raw data to a scenario with anonymized data. © 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.
    DOI Publisher Details
    Details
  2. Campanile, L., Iacono, M., Marulli, F., Gribaudo, M., & Mastroianni, M. (2022). A DSL-based modeling approach for energy harvesting IoT/WSN [Conference paper]. Proceedings - European Council for Modelling and Simulation, ECMS, 2022-May, 317–323. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85130645195&partnerID=40&md5=f2d475b445f76d3b5f49752171c0fada
    Abstract
    The diffusion of intelligent services and the push for the integration of computing systems and services in the environment in which they operate require a constant sensing activity and the acquisition of different information from the environment and the users. Health monitoring, domotics, Industry 4.0 and environmental challenges leverage the availability of cost-effective sensing solutions that allow both the creation of knowledge bases and the automatic process of them, be it with algorithmic approaches or artificial intelligence solutions. The foundation of these solutions is given by the Internet of Things (IoT), and the substanding Wireless Sensor Networks (WSN) technology stack. Of course, design approaches are needed that enable defining efficient and effective sensing infrastructures, including energy related aspects. In this paper we present a Domain Specific Language for the design of energy aware WSN IoT solutions, that allows domain experts to define sensor network models that may be then analyzed by simulation-based or analytic techniques to evaluate the effect of task allocation and offioading and energy harvesting and utilization in the network. The language has been designed to leverage the SIMTHESys modeling framework and its multiformalism modeling evaluation features. ©ECMS Ibrahim A. Hameed, Agus Hasan, Saleh Abdel-Afou Alaliyat (Editors) 2022
    Publisher Details
    Details

2021

  1. Campanile, L., Cantiello, P., Iacono, M., Marulli, F., & Mastroianni, M. (2021). Risk Analysis of a GDPR-Compliant Deletion Technique for Consortium Blockchains Based on Pseudonymization [Conference paper]. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 12956 LNCS, 3–14. https://doi.org/10.1007/978-3-030-87010-2_1
    Abstract
    Blockchains provide a valid and profitable support for the implementation of trustable and secure distributed ledgers, in support to groups of subjects that are potentially competitors in conflict of interest but need to share progressive information recording processes. Blockchains prevent data stored in blocks from being altered or deleted, but there are situations in which stored information must be deleted or made inaccessible on request or periodically, such as the ones in which GDPR is applicable. In this paper we present literature solutions and design an implementation in the context of a traffic management system for the Internet of Vehicles based on the Pseudonymization/Cryptography solution, evaluating its viability, its GDPR compliance and its level of risk. © 2021, Springer Nature Switzerland AG.
    DOI Publisher Details
    Details
  2. Campanile, L., Gribaudo, M., Iacono, M., & Mastroianni, M. (2021). Hybrid Simulation of Energy Management in IoT Edge Computing Surveillance Systems [Conference paper]. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 13104 LNCS, 345–359. https://doi.org/10.1007/978-3-030-91825-5_21
    Abstract
    Internet of Things (IoT) is a well established approach used for the implementation of surveillance systems that are suitable for monitoring large portions of territory. Current developments allow the design of battery powered IoT nodes that can communicate over the network with low energy requirements and locally perform some computing and coordination task, besides running sensing and related processing: it is thus possible to implement edge computing oriented solutions on IoT, if the design encompasses both hardware and software elements in terms of sensing, processing, computing, communications and routing energy costs as one of the quality indices of the system. In this paper we propose a modeling approach for edge computing IoT-based monitoring systems energy related characteristics, suitable for the analysis of energy levels of large battery powered monitoring systems with dynamic and reactive computing workloads. © 2021, Springer Nature Switzerland AG.
    DOI Publisher Details
    Details
  3. Campanile, L., Forgione, F., Marulli, F., Palmiero, G., & Sanghez, C. (2021). Dataset Anonimyzation for Machine Learning: An ISP Case Study [Conference paper]. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 12950 LNCS, 589–597. https://doi.org/10.1007/978-3-030-86960-1_42
    Abstract
    Internet Service Providers technical support needs personal data to predict potential anomalies. In this paper, we performed a comparative study of forecasting performance using raw data and anonymized data, in order to assess how much performance may vary, when plain personal data are replaced by anonymized personal data. © 2021, Springer Nature Switzerland AG.
    DOI Publisher Details
    Details
  4. Campanile, L., Marulli, F., Mastroianni, M., Palmiero, G., & Sanghez, C. (2021). Machine Learning-aided Automatic Calibration of Smart Thermal Cameras for Health Monitoring Applications [Conference paper]. International Conference on Internet of Things, Big Data and Security, IoTBDS - Proceedings, 2021-April, 343–353. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85137959400&partnerID=40&md5=eb78330cb4d585e500b77cd906edfbc7
    Abstract
    In this paper, we introduce a solution aiming to improve the accuracy of the surface temperature detection in an outdoor environment. The temperature sensing subsystem relies on Mobotix thermal camera without the black body, the automatic compensation subsystem relies on Raspberry Pi with Node-RED and TensorFlow 2.x. The final results showed that it is possible to automatically calibrate the camera using machine learning and that it is possible to use thermal imaging cameras even in critical conditions such as outdoors. Future development is to improve performance using computer vision techniques to rule out irrelevant measurements. © 2021 by SCITEPRESS - Science and Technology Publications, Lda.
    Publisher Details
    Details

2020

  1. Campanile, L., Iacono, M., Lotito, R., & Mastroianni, M. (2020). A WSN Energy-Aware approach for air pollution monitoring in waste treatment facility site: A case study for landfill monitoring odour [Conference paper]. IoTBDS 2020 - Proceedings of the 5th International Conference on Internet of Things, Big Data and Security, 526–532. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85089477488&partnerID=40&md5=13ea9ca38f15c5b885ef7e501067010c
    Abstract
    The gaseous emissions derived from industrial plants are generally subject to a strictly program of monitoring, both continuous or one-spot, in order to comply with the limits imposed by the permitting license. Nowadays the problem of odour emission, and the consequently nuisance generated to the nearest receptors, has acquired importance so that is frequently asked a specific implementation of the air pollution monitoring program. In this paper we studied the case study of a generic landfill for the implementation of the odour monitoring system and time-specific use of air pollution control technology. The off-site monitoring is based on the deployment of electronic nose as part of a specifically built WSN system. The nodes outside the landfill boundary do not act as a continuously monitoring stations but as sensors activated when specific conditions, inside and outside the landfill, are achieved. The WSN is then organized on an energy-aware approach so to prolong the lifetime of the entire system, with significant cost-benefit advancement, and produce a monitoring-structure that can answer to specific input like threshold overshooting. Copyright © 2020 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved.
    Publisher Details
    Details
  2. Campanile, L., Iacono, M., Marulli, F., & Mastroianni, M. (2020). Privacy regulations challenges on data-centric and iot systems: A case study for smart vehicles [Conference paper]. IoTBDS 2020 - Proceedings of the 5th International Conference on Internet of Things, Big Data and Security, 507–520. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85089476036&partnerID=40&md5=c18dd73c221ec312a330521bf03d332e
    Abstract
    Internet of Things (IoTs) services and data-centric systems allow smart and efficient information exchanging. Anyway, even if existing IoTs and cyber security architectures are enforcing, they are still vulnerable to security issues, as unauthorized access, data breaches, intrusions. They can’t provide yet sufficiently robust and secure solutions to be applied in a straightforward way, both for ensuring privacy preservation and trustworthiness of transmitted data, evenly preventing from its fraudulent and unauthorized usage. Such data potentially include critical information about persons’ privacy (locations, visited places, behaviors, goods, anagraphic data and health conditions). So, novel approaches for IoTs and data-centric security are needed. In this work, we address IoTs systems security problem focusing on the privacy preserving issue. Indeed, after the European Union introduced the General Data Protection Regulation (GDPR), privacy data protection is a mandatory requirement for systems producing and managing sensible users’ data. Starting from a case study for the Internet of Vehicles (IoVs), we performed a pilot study and DPIA assessment to analyze possible mitigation strategies for improving the compliance of IoTs based systems to GDPR requirements. Our preliminary results evidenced that the introduction of blockchains in IoTs systems architectures can improve significantly the compliance to privacy regulations. Copyright © 2020 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved.
    Publisher Details
    Details
  3. Mainenti, G., Campanile, L., Marulli, F., Ricciardi, C., & Valente, A. S. (2020). Machine learning approaches for diabetes classification: Perspectives to artificial intelligence methods updating [Conference paper]. IoTBDS 2020 - Proceedings of the 5th International Conference on Internet of Things, Big Data and Security, 533–540. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85089519717&partnerID=40&md5=bf7cc36e86c1988dd85e04c2fce06de1
    Abstract
    In recent years the application of Machine Learning (ML) and Artificial Intelligence (AI) techniques in healthcare helped clinicians to improve the management of chronic patients. Diabetes is among the most common chronic illness in the world for which often is still challenging do an early detection and a correct classification of type of diabetes to an individual. In fact it often depends on the circumstances present at the time of diagnosis, and many diabetic individuals do not easily fit into a single class. The aim is this paper is the application of ML techniques in order to classify the occurrence of different mellitus diabetes on the base of clinical data obtained from diabetic patients during the daily hospitals activities. Copyright © 2020 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved.
    Publisher Details
    Details
  4. Campanile, L., Iacono, M., Marulli, F., & Mastroianni, M. (2020). A simulation study on a WSN for emergency management [Conference paper]. Proceedings - European Council for Modelling and Simulation, ECMS, 34(1), 384–392. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85094937629&partnerID=40&md5=69ee7b771d76c72bd5012883b86e67ca
    Abstract
    Wireless Sensors Networks (WSN) are one of the ways to provide the communication infrastructure for advanced applications based on the Internet of Things (IoT) paradigm. IoT supports high level applications over WSN to provide services in a number of fields. WSN are also suitable to support critical applications, as the supporting technologies are consolidated and standard network services can be used on top of the specific layers. Furthermore, generic distributed or network-enabled software can be run over the nodes of a WSN. In this paper we evaluate and compare performances of IEEE 802.llg and 802.1 In, two implementations of the popular Wi-Fi technology, to support the deployment and utilization of an energy management support system, used to monitor the field by a team of firefighters during a mission. Evaluation on an example scenario is done by using ns-3, an open network simulator characterized by its realistic details, to understand the actual limitations of the two standards besides theoretical limits. © ECMS Mike Steglich, Christian Mueller, Gaby Neumann, Mathias Walther.
    Publisher Details
    Details

← Back to all publications