Publications

Security

  • M. Amoretti, R. Pecori, Y. Protskaya, L. Veltri, F. Zanichelli, “A Scalable and Secure PublishSubscribe-Based Framework for Industrial IoT”, IEEE Transactions on Industrial Informatics, vol. 17, pp. 3815-3825, 2021

  • M. Picone, S. Cirani, L. Veltri, “Blockchain security and privacy for the internet of things”, Sensors (Switzerland), vol. 21, pp. 1-4, 2021

  • L. Aversano, M.L. Bernardi, M. Cimitile, R. Pecori, L. Veltri, “Effective Anomaly Detection Using Deep Learning in IoT Systems”, Wireless Communications and Mobile Computing, vol. 2021, 2021

  • R. Pecori, A. Tayebi, A. Vannucci, L. Veltri, “IoT Attack Detection with Deep Learning Analysis”, Proceedings of the International Joint Conference on Neural Networks, 2020

  • Y. Protskaya, L. Veltri, “Broker bridging mechanism for providing anonymity in MQTT”, Proceedings of the 2019 10th International Conference on Networks of the Future, NoF 2019, pp. 110-113, 2019

  • M. Calabretta, R. Pecori, L. Veltri, “A Token-based Protocol for Securing MQTT Communications”, 2018 26th International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2018, pp. 373-378, 2018

  • O. Alphand, M. Amoretti, T. Claeys, S. Dall'Asta, A. Duda, G. Ferrari, F. Rousseau, B. Tourancheau, L. Veltri, F. Zanichelli, “IoTChain: A blockchain security architecture for the Internet of Things”, IEEE Wireless Communications and Networking Conference, WCNC, vol. 2018-April, pp. 1-6, 2018

  • R. Pecori, L. Veltri, “A balanced trust-based method to counter Sybil and Spartacus attacks in Chord”, Security and Communication Networks, vol. 2018, 2018

  • M. Calabretta, R. Pecori, M. Vecchio, L. Veltri, “MQTT-AUTH: A token-based solution to endow MQTT with authentication and authorization capabilities”, Journal of Communications Software and Systems, vol. 14, pp. 320-331, 2018

  • L. Davoli, L. Belli, L. Veltri, G. Ferrari, “THORIN: An Efficient Module for Federated Access and Threat Mitigation in Big Stream Cloud Architectures”, IEEE Cloud Computing, vol. 5, pp. 38-48, 2018

  • L. Davoli, Y. Protskaya, L. Veltri, “An anonymization protocol for the Internet of Things”, Proceedings of the International Symposium on Wireless Communication Systems, vol. 2017-August, pp. 459-464, 2017

  • R. Pecori, L. Veltri, “3AKEP: Triple-authenticated key exchange protocol for peer-to-peer VoIP applications”, Computer Communications, vol. 85, pp. 28-40, 2016

  • S. Cirani, M. Picone, P. Gonizzi, L. Veltri, G. Ferrari, “IoT-OAS: An oauth-based authorization service architecture for secure services in IoT scenarios”, IEEE Sensors Journal, vol. 15, pp. 1224-1234, 2015

  • R. Pecori, L. Veltri, “Trust-based routing for Kademlia in a sybil scenario”, 2014 22nd International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2014, pp. 279-283, 2014

  • R. Pecori, L. Veltri, “A statistical blind technique for recognition of internet traffic with dependence enforcement”, IWCMC 2014 - 10th International Wireless Communications and Mobile Computing Conference, pp. 328-333, 2014

  • L. Veltri, S. Cirani, S. Busanelli, G. Ferrari, “A novel batch-based group key management protocol applied to the Internet of Things”, Ad Hoc Networks, vol. 11, pp. 2724-2737, 2013

  • L. Veltri, S. Cirani, G. Ferrari, S. Busanelli, “Batch-based group key management with shared key derivation in the internet of things”, 2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013, pp. 1688-1693, 2013

  • S. Cirani, G. Ferrari, L. Veltri, “Enforcing security mechanisms in the IP-based internet of things: An algorithmic overview”, Algorithms, vol. 6, pp. 197-226, 2013

  • S. Busanelli, G. Ferrari, L. Veltri, “Short-lived key management for secure communications in VANETs”, 2011 11th International Conference on ITS Telecommunications, ITST 2011, pp. 613-618, 2011

  • S. Cirani, R. Pecori, L. Veltri, “A peer-to-peer secure VoIP architecture”, Trustworthy Internet, pp. 105-115, 2011

  • R. Pecori, L. Veltri, “A key agreement protocol for P2P voIP applications”, SoftCOM 2009 - 17th International Conference on Software, Telecommunications and Computer Networks, pp. 276-280, 2009

  • N. Fedotova, L. Veltri, “Reputation management algorithms for DHT-based peer-to-peer environment”, Computer Communications, vol. 32, pp. 1400-1409, 2009

  • N. Fedotova, G. Orzetti, L. Veltri, A. Zaccagnini, “Byzantine agreement for reputation management in DHT-based peer-to-peer networks”, 2008 International Conference on Telecommunications, ICT, 2008

  • N. Fedotova, L. Veltri, “Reputation management for DHT-based collaborative environments”, 4th EURO-NGI Conference on Next Generation Internet Networks - Proceedings, pp. 316-321, 2008

  • S. Salsano, A. Polidoro, L. Veltri, “Extending SIP Authentication to exploit user credentials stored in existing authentication databases”, SoftCom 2008: 16th International Conference on Software, Telecommuncations and Computer Networks, pp. 375-379, 2008

  • N. Fedotova, M. Bertucci, L. Veltri, “Reputation management techniques in DHT-based peer-to-peer networks”, Second International Conference on Internet and Web Applications and Services, ICIW’07, 2007

  • N. Fedotova, L. Veltri, “Byzantine generals problem in the light of P2P computing”, 2006 3rd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, MobiQuitous, 2006

  • L. Veltri, S. Salsano, G. Martiniello, “Wireless LAN-3G integration: Unified mechanisms for secure authentication based on SIP”, IEEE International Conference on Communications, vol. 5, pp. 2219-2224, 2006

  • D. Severina, A. Ordine, M. Brunato, L. Veltri, “UniWireless: A distributed open access network”, wmash 2006 - Proceedings of the Fourth ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, vol. 2006, pp. 30-36, 2006

  • S. Salsano, L. Veltri, D. Papalilo, “SIP security issues: The SIP authentication procedure and its processing load”, IEEE Network, vol. 16, pp. 38-44, 2002

Internet of Things (IoT)

  • M. Amoretti, R. Pecori, Y. Protskaya, L. Veltri, F. Zanichelli, “A Scalable and Secure PublishSubscribe-Based Framework for Industrial IoT”, IEEE Transactions on Industrial Informatics, vol. 17, pp. 3815-3825, 2021

  • M. Picone, S. Cirani, L. Veltri, “Blockchain security and privacy for the internet of things”, Sensors (Switzerland), vol. 21, pp. 1-4, 2021

  • L. Aversano, M.L. Bernardi, M. Cimitile, R. Pecori, L. Veltri, “Effective Anomaly Detection Using Deep Learning in IoT Systems”, Wireless Communications and Mobile Computing, vol. 2021, 2021

  • R. Pecori, A. Tayebi, A. Vannucci, L. Veltri, “IoT Attack Detection with Deep Learning Analysis”, Proceedings of the International Joint Conference on Neural Networks, 2020

  • Y. Protskaya, L. Veltri, “Broker bridging mechanism for providing anonymity in MQTT”, Proceedings of the 2019 10th International Conference on Networks of the Future, NoF 2019, pp. 110-113, 2019

  • S. Busanelli, S. Cirani, L. Melegari, M. Picone, M. Rosa, L. Veltri, “A sidecar object for the optimized communication between Edge and Cloud in Internet of Things applications”, Future Internet, vol. 11, 2019

  • M. Calabretta, R. Pecori, L. Veltri, “A Token-based Protocol for Securing MQTT Communications”, 2018 26th International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2018, pp. 373-378, 2018

  • O. Alphand, M. Amoretti, T. Claeys, S. Dall'Asta, A. Duda, G. Ferrari, F. Rousseau, B. Tourancheau, L. Veltri, F. Zanichelli, “IoTChain: A blockchain security architecture for the Internet of Things”, IEEE Wireless Communications and Networking Conference, WCNC, vol. 2018-April, pp. 1-6, 2018

  • M. Calabretta, R. Pecori, M. Vecchio, L. Veltri, “MQTT-AUTH: A token-based solution to endow MQTT with authentication and authorization capabilities”, Journal of Communications Software and Systems, vol. 14, pp. 320-331, 2018

  • L. Davoli, L. Belli, L. Veltri, G. Ferrari, “THORIN: An Efficient Module for Federated Access and Threat Mitigation in Big Stream Cloud Architectures”, IEEE Cloud Computing, vol. 5, pp. 38-48, 2018

  • L. Davoli, Y. Protskaya, L. Veltri, “An anonymization protocol for the Internet of Things”, Proceedings of the International Symposium on Wireless Communication Systems, vol. 2017-August, pp. 459-464, 2017

  • S. Cirani, M. Picone, P. Gonizzi, L. Veltri, G. Ferrari, “IoT-OAS: An oauth-based authorization service architecture for secure services in IoT scenarios”, IEEE Sensors Journal, vol. 15, pp. 1224-1234, 2015

  • S. Cirani, L. Veltri, “Lightweight session initiation for the internet of things”, 2015 IEEE Global Communications Conference, GLOBECOM 2015, 2015

  • S. Cirani, M. Picone, L. Veltri, “mjCoAP: An open-source lightweight java CoAP library for internet of things applications”, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 9001, pp. 118-133, 2015

  • S. Cirani, L. Davoli, G. Ferrari, R. Leone, P. Medagliani, M. Picone, L. Veltri, “A scalable and self-configuring architecture for service discovery in the internet of things”, IEEE Internet of Things Journal, vol. 1, pp. 508-521, 2014

  • S. Cirani, L. Davoli, M. Picone, L. Veltri, “Performance evaluation of a SIP-based constrained peer-to-peer overlay”, Proceedings of the 2014 International Conference on High Performance Computing and Simulation, HPCS 2014, pp. 432-435, 2014

  • M. Antonini, S. Cirani, G. Ferrari, P. Medagliani, M. Picone, L. Veltri, “Lightweight multicast forwarding for service discovery in low-power IoT networks”, 2014 22nd International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2014, pp. 133-138, 2014

  • S. Cirani, M. Picone, L. Veltri, “A session initiation protocol for the internet of things”, Scalable Computing, vol. 14, pp. 249-263, 2013

  • L. Veltri, S. Cirani, S. Busanelli, G. Ferrari, “A novel batch-based group key management protocol applied to the Internet of Things”, Ad Hoc Networks, vol. 11, pp. 2724-2737, 2013

  • L. Veltri, S. Cirani, G. Ferrari, S. Busanelli, “Batch-based group key management with shared key derivation in the internet of things”, 2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013, pp. 1688-1693, 2013

  • S. Cirani, G. Ferrari, L. Veltri, “Enforcing security mechanisms in the IP-based internet of things: An algorithmic overview”, Algorithms, vol. 6, pp. 197-226, 2013

  • S. Cirani, M. Picone, L. Veltri, “CoSIP: A Constrained Session Initiation Protocol for the Internet of Things”, Communications in Computer and Information Science, vol. 393 CCIS, pp. 13-24, 2013

  • S. Busanelli, G. Ferrari, L. Veltri, “Short-lived key management for secure communications in VANETs”, 2011 11th International Conference on ITS Telecommunications, ITST 2011, pp. 613-618, 2011

Software

  • S. Cirani, M. Picone, L. Veltri, L. Zaccomer, F. Zanichelli, “ZWT: A new cross-platform graphical interface framework for Java applications”, SoftwareX, vol. 12, 2020

  • L. Veltri, L. Davoli, R. Pecori, A. Vannucci, F. Zanichelli, “NEMO: A flexible and highly scalable network EMulatOr”, SoftwareX, vol. 10, 2019

  • L. Davoli, Y. Protskaya, L. Veltri, “NEMO: A Flexible Java-based Network Emulator”, 2018 26th International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2018, pp. 111-116, 2018

  • S. Cirani, M. Picone, L. Veltri, “mjCoAP: An open-source lightweight java CoAP library for internet of things applications”, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 9001, pp. 118-133, 2015

  • L. Veltri, C. Fadda, “An open-source platform for IP telephony services”, 2007 15th International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2007, pp. 291-295, 2007

Peer-to-Peer (P2P)

  • R. Pecori, L. Veltri, “A balanced trust-based method to counter Sybil and Spartacus attacks in Chord”, Security and Communication Networks, vol. 2018, 2018

  • S. Cirani, L. Davoli, G. Ferrari, R. Leone, P. Medagliani, M. Picone, L. Veltri, “A scalable and self-configuring architecture for service discovery in the internet of things”, IEEE Internet of Things Journal, vol. 1, pp. 508-521, 2014

  • R. Pecori, L. Veltri, “Trust-based routing for Kademlia in a sybil scenario”, 2014 22nd International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2014, pp. 279-283, 2014

  • S. Cirani, L. Davoli, M. Picone, L. Veltri, “Performance evaluation of a SIP-based constrained peer-to-peer overlay”, Proceedings of the 2014 International Conference on High Performance Computing and Simulation, HPCS 2014, pp. 432-435, 2014

  • S. Cirani, R. Pecori, L. Veltri, “A peer-to-peer secure VoIP architecture”, Trustworthy Internet, pp. 105-115, 2011

  • S. Cirani, L. Melegari, L. Veltri, “Peer-to-peer technologies applied to data warehouses”, 2010 IEEE Globecom Workshops, GC’10, pp. 1952-1956, 2010

  • R. Pecori, L. Veltri, “A key agreement protocol for P2P voIP applications”, SoftCOM 2009 - 17th International Conference on Software, Telecommunications and Computer Networks, pp. 276-280, 2009

  • S. Cirani, L. Veltri, “A multicast-based bootstrap mechanism for self-organizing P2P networks”, GLOBECOM - IEEE Global Telecommunications Conference, 2009

  • R.L. Cigno, T. Pecorella, M. Sereno, L. Veltri, “Peer-to-peer beyond file sharing: Where are P2P systems going?”, IPDPS 2009 - Proceedings of the 2009 IEEE International Parallel and Distributed Processing Symposium, 2009

  • N. Fedotova, L. Veltri, “Reputation management algorithms for DHT-based peer-to-peer environment”, Computer Communications, vol. 32, pp. 1400-1409, 2009

  • S. Cirani, L. Veltri, “Implementation of a framework for a DHT-based distributed location service”, SoftCom 2008: 16th International Conference on Software, Telecommuncations and Computer Networks, pp. 279-283, 2008

  • S. Cirani, N. Fedotova, L. Veltri, “A resilient architecture for DHT-based distributed collaborative environments”, Proceedings of the 2008 RISEEFTS Joint International Workshop on Software Engineering for Resilient Systems, SERENE’08/, pp. 1-8, 2008

  • N. Fedotova, G. Orzetti, L. Veltri, A. Zaccagnini, “Byzantine agreement for reputation management in DHT-based peer-to-peer networks”, 2008 International Conference on Telecommunications, ICT, 2008

  • N. Fedotova, L. Veltri, “Reputation management for DHT-based collaborative environments”, 4th EURO-NGI Conference on Next Generation Internet Networks - Proceedings, pp. 316-321, 2008

  • N. Fedotova, S. Fanti, L. Veltri, “Kademlia for data storage and retrieval in enterprise networks”, Proceedings of the 3rd International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2007, pp. 382-386, 2007

  • N. Fedotova, M. Bertucci, L. Veltri, “Reputation management techniques in DHT-based peer-to-peer networks”, Second International Conference on Internet and Web Applications and Services, ICIW’07, 2007

  • N. Fedotova, L. Veltri, “Byzantine generals problem in the light of P2P computing”, 2006 3rd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, MobiQuitous, 2006

Voice-over-IP (VoIP)

  • A.G. Forte, W. Wang, L. Veltri, G. Ferrari, “A next-generation core network architecture for mobile networks”, Future Internet, vol. 11, 2019

  • A.G. Forte, W. Wang, L. Veltri, G. Ferrari, “A P2P virtual core-network architecture for next-generation mobility networks”, 2016 IEEE Conference on Standards for Communications and Networking, CSCN 2016, 2016

  • R. Pecori, L. Veltri, “3AKEP: Triple-authenticated key exchange protocol for peer-to-peer VoIP applications”, Computer Communications, vol. 85, pp. 28-40, 2016

  • S. Cirani, R. Pecori, L. Veltri, “A peer-to-peer secure VoIP architecture”, Trustworthy Internet, pp. 105-115, 2011

  • R. Pecori, L. Veltri, “A key agreement protocol for P2P voIP applications”, SoftCOM 2009 - 17th International Conference on Software, Telecommunications and Computer Networks, pp. 276-280, 2009

  • S. Salsano, A. Polidoro, C. Mingardi, S. Niccolini, L. Veltri, “SIP-based mobility management in next generation networks”, IEEE Wireless Communications, vol. 15, pp. 92-99, 2008

  • S. Salsano, A. Polidoro, L. Veltri, “Extending SIP Authentication to exploit user credentials stored in existing authentication databases”, SoftCom 2008: 16th International Conference on Software, Telecommuncations and Computer Networks, pp. 375-379, 2008

  • L. Veltri, C. Fadda, “An open-source platform for IP telephony services”, 2007 15th International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2007, pp. 291-295, 2007

  • G. Adorni, M. Coccoli, C. Fadda, L. Veltri, “Audio and video conferencing tools in learning management systems”, Proceedings - 3rd International Conference on Automated Production of Cross Media Content for Multi-Channel Distribution, AXMEDIS 2007, pp. 123-129, 2007

  • S. Salsano, L. Veltri, A. Polidoro, A. Ordine, “Architecture and testbed implementation of vertical handovers based on SIP session border controllers”, Wireless Personal Communications, vol. 43, pp. 1019-1034, 2007

  • A. Ordine, J.F. GutiĆ©rrez, L. Veltri, “SIP roaming solution amongst different WLAN-based service providers”, 2006 3rd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, MobiQuitous, 2006

  • L. Veltri, S. Salsano, G. Martiniello, “Wireless LAN-3G integration: Unified mechanisms for secure authentication based on SIP”, IEEE International Conference on Communications, vol. 5, pp. 2219-2224, 2006

  • S. Salsano, L. Veltri, G. Martiniello, A. Polidoro, “Seamless vertical handover of VoIP calls based on SIP Session Border Controllers”, IEEE International Conference on Communications, vol. 5, pp. 2040-2047, 2006

  • S. Giordano, M. Listanti, F. Mustacchio, S. Niccolini, S. Salsano, L. Veltri, “Dynamic resource configuration in DiffServ networks: Control plane mechanisms and performance evaluation of a traffic control API”, Computer Networks, vol. 44, pp. 513-527, 2004

  • S. Giordano, M. Listanti, F. Mustacchio, S. Niccolini, S. Salsano, L. Veltri, “SIP originated dynamic resource configuration in DiffServ networks: SIP COPS traffic control mechanisms”, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 2601, pp. 581-591, 2003

  • S. Salsano, L. Veltri, D. Papalilo, “SIP security issues: The SIP authentication procedure and its processing load”, IEEE Network, vol. 16, pp. 38-44, 2002

  • S. Salsano, L. Veltri, “QoS control by means of COPS to support SIP-based applications”, IEEE Network, vol. 16, pp. 27-33, 2002

  • A. Floris, L. Veltri, “Roaming scenarios based on SIP”, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 2496, pp. 302-314, 2002

  • G. de Marco, S. Loreto, G. Sorrentino, L. Veltri, “SIP-H323: A solution for interworking saving existing architecture”, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 2345, pp. 1111-1116, 2002

Routing

  • L. Veltri, L. Davoli, R. Pecori, A. Vannucci, F. Zanichelli, “NEMO: A flexible and highly scalable network EMulatOr”, SoftwareX, vol. 10, 2019

  • L. Davoli, Y. Protskaya, L. Veltri, “NEMO: A Flexible Java-based Network Emulator”, 2018 26th International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2018, pp. 111-116, 2018

  • A. Abdelsalam, F. Clad, C. Filsfils, S. Salsano, G. Siracusano, L. Veltri, “Implementation of virtual network function chaining through segment routing in a linux-based NFV infrastructure”, 2017 IEEE Conference on Network Softwarization: Softwarization Sustaining a Hyper-Connected World: en Route to 5G, NetSoft 2017, 2017

  • S. Salsano, L. Veltri, L. Davoli, P.L. Ventre, G. Siracusano, “PMSR - Poor Man's Segment Routing, a minimalistic approach to Segment Routing and a Traffic Engineering use case”, Proceedings of the NOMS 2016 - 2016 IEEEIFIP Network Operations and Management Symposium/, pp. 598-604, 2016

  • L. Davoli, L. Veltri, P.L. Ventre, G. Siracusano, S. Salsano, “Traffic Engineering with Segment Routing: SDN-Based Architectural Design and Open Source Implementation”, Proceedings - European Workshop on Software Defined Networks, EWSDN, pp. 111-112, 2015

  • S. Salsano, N. Blefari-Melazzi, A. Detti, G. Morabito, L. Veltri, “Information centric networking over SDN and OpenFlow: Architectural aspects and experiments on the OFELIA testbed”, Computer Networks, vol. 57, pp. 3207-3221, 2013

  • L. Veltri, G. Morabito, S. Salsano, N. Blefari-Melazzi, A. Detti, “Supporting information-centric functionality in software defined networks”, IEEE International Conference on Communications, pp. 6645-6650, 2012

  • N.B. Melazzi, A. Detti, G. Mazza, G. Morabito, S. Salsano, L. Veltri, “An OpenFlow-based testbed for information centric networking”, 2012 Future Network and Mobile Summit, FutureNetw 2012, 2012