Publications

  • M. Amoretti, R. Pecori, Y. Protskaya, L. Veltri, F. Zanichelli, “A Scalable and Secure PublishSubscribe-Based Framework for Industrial IoT”, IEEE Transactions on Industrial Informatics, vol. 17, pp. 3815-3825, 2021

  • M. Picone, S. Cirani, L. Veltri, “Blockchain security and privacy for the internet of things”, Sensors (Switzerland), vol. 21, pp. 1-4, 2021

  • L. Aversano, M.L. Bernardi, M. Cimitile, R. Pecori, L. Veltri, “Effective Anomaly Detection Using Deep Learning in IoT Systems”, Wireless Communications and Mobile Computing, vol. 2021, 2021

  • R. Pecori, A. Tayebi, A. Vannucci, L. Veltri, “IoT Attack Detection with Deep Learning Analysis”, Proceedings of the International Joint Conference on Neural Networks, 2020

  • S. Cirani, M. Picone, L. Veltri, L. Zaccomer, F. Zanichelli, “ZWT: A new cross-platform graphical interface framework for Java applications”, SoftwareX, vol. 12, 2020

  • Y. Protskaya, L. Veltri, “Broker bridging mechanism for providing anonymity in MQTT”, Proceedings of the 2019 10th International Conference on Networks of the Future, NoF 2019, pp. 110-113, 2019

  • A.G. Forte, W. Wang, L. Veltri, G. Ferrari, “A next-generation core network architecture for mobile networks”, Future Internet, vol. 11, 2019

  • L. Veltri, L. Davoli, R. Pecori, A. Vannucci, F. Zanichelli, “NEMO: A flexible and highly scalable network EMulatOr”, SoftwareX, vol. 10, 2019

  • S. Busanelli, S. Cirani, L. Melegari, M. Picone, M. Rosa, L. Veltri, “A sidecar object for the optimized communication between Edge and Cloud in Internet of Things applications”, Future Internet, vol. 11, 2019

  • L. Davoli, Y. Protskaya, L. Veltri, “NEMO: A Flexible Java-based Network Emulator”, 2018 26th International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2018, pp. 111-116, 2018

  • M. Calabretta, R. Pecori, L. Veltri, “A Token-based Protocol for Securing MQTT Communications”, 2018 26th International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2018, pp. 373-378, 2018

  • O. Alphand, M. Amoretti, T. Claeys, S. Dall'Asta, A. Duda, G. Ferrari, F. Rousseau, B. Tourancheau, L. Veltri, F. Zanichelli, “IoTChain: A blockchain security architecture for the Internet of Things”, IEEE Wireless Communications and Networking Conference, WCNC, vol. 2018-April, pp. 1-6, 2018

  • R. Pecori, L. Veltri, “A balanced trust-based method to counter Sybil and Spartacus attacks in Chord”, Security and Communication Networks, vol. 2018, 2018

  • M. Calabretta, R. Pecori, M. Vecchio, L. Veltri, “MQTT-AUTH: A token-based solution to endow MQTT with authentication and authorization capabilities”, Journal of Communications Software and Systems, vol. 14, pp. 320-331, 2018

  • L. Davoli, L. Belli, L. Veltri, G. Ferrari, “THORIN: An Efficient Module for Federated Access and Threat Mitigation in Big Stream Cloud Architectures”, IEEE Cloud Computing, vol. 5, pp. 38-48, 2018

  • L. Davoli, Y. Protskaya, L. Veltri, “An anonymization protocol for the Internet of Things”, Proceedings of the International Symposium on Wireless Communication Systems, vol. 2017-August, pp. 459-464, 2017

  • A. Abdelsalam, F. Clad, C. Filsfils, S. Salsano, G. Siracusano, L. Veltri, “Implementation of virtual network function chaining through segment routing in a linux-based NFV infrastructure”, 2017 IEEE Conference on Network Softwarization: Softwarization Sustaining a Hyper-Connected World: en Route to 5G, NetSoft 2017, 2017

  • A.G. Forte, W. Wang, L. Veltri, G. Ferrari, “A P2P virtual core-network architecture for next-generation mobility networks”, 2016 IEEE Conference on Standards for Communications and Networking, CSCN 2016, 2016

  • R. Pecori, L. Veltri, “3AKEP: Triple-authenticated key exchange protocol for peer-to-peer VoIP applications”, Computer Communications, vol. 85, pp. 28-40, 2016

  • S. Salsano, L. Veltri, L. Davoli, P.L. Ventre, G. Siracusano, “PMSR - Poor Man's Segment Routing, a minimalistic approach to Segment Routing and a Traffic Engineering use case”, Proceedings of the NOMS 2016 - 2016 IEEEIFIP Network Operations and Management Symposium/, pp. 598-604, 2016

  • L. Davoli, L. Veltri, P.L. Ventre, G. Siracusano, S. Salsano, “Traffic Engineering with Segment Routing: SDN-Based Architectural Design and Open Source Implementation”, Proceedings - European Workshop on Software Defined Networks, EWSDN, pp. 111-112, 2015

  • S. Cirani, M. Picone, P. Gonizzi, L. Veltri, G. Ferrari, “IoT-OAS: An oauth-based authorization service architecture for secure services in IoT scenarios”, IEEE Sensors Journal, vol. 15, pp. 1224-1234, 2015

  • S. Cirani, L. Veltri, “Lightweight session initiation for the internet of things”, 2015 IEEE Global Communications Conference, GLOBECOM 2015, 2015

  • S. Cirani, M. Picone, L. Veltri, “mjCoAP: An open-source lightweight java CoAP library for internet of things applications”, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 9001, pp. 118-133, 2015

  • S. Cirani, L. Davoli, G. Ferrari, R. Leone, P. Medagliani, M. Picone, L. Veltri, “A scalable and self-configuring architecture for service discovery in the internet of things”, IEEE Internet of Things Journal, vol. 1, pp. 508-521, 2014

  • R. Pecori, L. Veltri, “Trust-based routing for Kademlia in a sybil scenario”, 2014 22nd International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2014, pp. 279-283, 2014

  • R. Pecori, L. Veltri, “A statistical blind technique for recognition of internet traffic with dependence enforcement”, IWCMC 2014 - 10th International Wireless Communications and Mobile Computing Conference, pp. 328-333, 2014

  • S. Cirani, L. Davoli, M. Picone, L. Veltri, “Performance evaluation of a SIP-based constrained peer-to-peer overlay”, Proceedings of the 2014 International Conference on High Performance Computing and Simulation, HPCS 2014, pp. 432-435, 2014

  • M. Antonini, S. Cirani, G. Ferrari, P. Medagliani, M. Picone, L. Veltri, “Lightweight multicast forwarding for service discovery in low-power IoT networks”, 2014 22nd International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2014, pp. 133-138, 2014

  • S. Cirani, M. Picone, L. Veltri, “A session initiation protocol for the internet of things”, Scalable Computing, vol. 14, pp. 249-263, 2013

  • S. Salsano, N. Blefari-Melazzi, A. Detti, G. Morabito, L. Veltri, “Information centric networking over SDN and OpenFlow: Architectural aspects and experiments on the OFELIA testbed”, Computer Networks, vol. 57, pp. 3207-3221, 2013

  • L. Veltri, S. Cirani, S. Busanelli, G. Ferrari, “A novel batch-based group key management protocol applied to the Internet of Things”, Ad Hoc Networks, vol. 11, pp. 2724-2737, 2013

  • L. Veltri, S. Cirani, G. Ferrari, S. Busanelli, “Batch-based group key management with shared key derivation in the internet of things”, 2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013, pp. 1688-1693, 2013

  • S. Cirani, G. Ferrari, L. Veltri, “Enforcing security mechanisms in the IP-based internet of things: An algorithmic overview”, Algorithms, vol. 6, pp. 197-226, 2013

  • S. Cirani, M. Picone, L. Veltri, “CoSIP: A Constrained Session Initiation Protocol for the Internet of Things”, Communications in Computer and Information Science, vol. 393 CCIS, pp. 13-24, 2013

  • L. Veltri, G. Morabito, S. Salsano, N. Blefari-Melazzi, A. Detti, “Supporting information-centric functionality in software defined networks”, IEEE International Conference on Communications, pp. 6645-6650, 2012

  • N.B. Melazzi, A. Detti, G. Mazza, G. Morabito, S. Salsano, L. Veltri, “An OpenFlow-based testbed for information centric networking”, 2012 Future Network and Mobile Summit, FutureNetw 2012, 2012

  • S. Busanelli, G. Ferrari, L. Veltri, “Short-lived key management for secure communications in VANETs”, 2011 11th International Conference on ITS Telecommunications, ITST 2011, pp. 613-618, 2011

  • S. Cirani, R. Pecori, L. Veltri, “A peer-to-peer secure VoIP architecture”, Trustworthy Internet, pp. 105-115, 2011

  • S. Cirani, L. Melegari, L. Veltri, “Peer-to-peer technologies applied to data warehouses”, 2010 IEEE Globecom Workshops, GC’10, pp. 1952-1956, 2010

  • R. Pecori, L. Veltri, “A key agreement protocol for P2P voIP applications”, SoftCOM 2009 - 17th International Conference on Software, Telecommunications and Computer Networks, pp. 276-280, 2009

  • S. Cirani, L. Veltri, “A multicast-based bootstrap mechanism for self-organizing P2P networks”, GLOBECOM - IEEE Global Telecommunications Conference, 2009

  • R.L. Cigno, T. Pecorella, M. Sereno, L. Veltri, “Peer-to-peer beyond file sharing: Where are P2P systems going?”, IPDPS 2009 - Proceedings of the 2009 IEEE International Parallel and Distributed Processing Symposium, 2009

  • N. Fedotova, L. Veltri, “Reputation management algorithms for DHT-based peer-to-peer environment”, Computer Communications, vol. 32, pp. 1400-1409, 2009

  • S. Cirani, L. Veltri, “Implementation of a framework for a DHT-based distributed location service”, SoftCom 2008: 16th International Conference on Software, Telecommuncations and Computer Networks, pp. 279-283, 2008

  • S. Cirani, N. Fedotova, L. Veltri, “A resilient architecture for DHT-based distributed collaborative environments”, Proceedings of the 2008 RISEEFTS Joint International Workshop on Software Engineering for Resilient Systems, SERENE’08/, pp. 1-8, 2008

  • N. Fedotova, G. Orzetti, L. Veltri, A. Zaccagnini, “Byzantine agreement for reputation management in DHT-based peer-to-peer networks”, 2008 International Conference on Telecommunications, ICT, 2008

  • N. Fedotova, L. Veltri, “Reputation management for DHT-based collaborative environments”, 4th EURO-NGI Conference on Next Generation Internet Networks - Proceedings, pp. 316-321, 2008

  • S. Salsano, A. Polidoro, C. Mingardi, S. Niccolini, L. Veltri, “SIP-based mobility management in next generation networks”, IEEE Wireless Communications, vol. 15, pp. 92-99, 2008

  • S. Salsano, A. Polidoro, L. Veltri, “Extending SIP Authentication to exploit user credentials stored in existing authentication databases”, SoftCom 2008: 16th International Conference on Software, Telecommuncations and Computer Networks, pp. 375-379, 2008

  • L. Veltri, C. Fadda, “An open-source platform for IP telephony services”, 2007 15th International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2007, pp. 291-295, 2007

  • N. Fedotova, S. Fanti, L. Veltri, “Kademlia for data storage and retrieval in enterprise networks”, Proceedings of the 3rd International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2007, pp. 382-386, 2007

  • G. Adorni, M. Coccoli, C. Fadda, L. Veltri, “Audio and video conferencing tools in learning management systems”, Proceedings - 3rd International Conference on Automated Production of Cross Media Content for Multi-Channel Distribution, AXMEDIS 2007, pp. 123-129, 2007

  • S. Salsano, L. Veltri, A. Polidoro, A. Ordine, “Architecture and testbed implementation of vertical handovers based on SIP session border controllers”, Wireless Personal Communications, vol. 43, pp. 1019-1034, 2007

  • N. Fedotova, M. Bertucci, L. Veltri, “Reputation management techniques in DHT-based peer-to-peer networks”, Second International Conference on Internet and Web Applications and Services, ICIW’07, 2007

  • N. Fedotova, L. Veltri, “Byzantine generals problem in the light of P2P computing”, 2006 3rd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, MobiQuitous, 2006

  • A. Ordine, J.F. GutiĆ©rrez, L. Veltri, “SIP roaming solution amongst different WLAN-based service providers”, 2006 3rd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, MobiQuitous, 2006

  • L. Veltri, S. Salsano, G. Martiniello, “Wireless LAN-3G integration: Unified mechanisms for secure authentication based on SIP”, IEEE International Conference on Communications, vol. 5, pp. 2219-2224, 2006

  • S. Salsano, L. Veltri, G. Martiniello, A. Polidoro, “Seamless vertical handover of VoIP calls based on SIP Session Border Controllers”, IEEE International Conference on Communications, vol. 5, pp. 2040-2047, 2006

  • D. Severina, A. Ordine, M. Brunato, L. Veltri, “UniWireless: A distributed open access network”, wmash 2006 - Proceedings of the Fourth ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, vol. 2006, pp. 30-36, 2006

  • S. Giordano, M. Listanti, F. Mustacchio, S. Niccolini, S. Salsano, L. Veltri, “Dynamic resource configuration in DiffServ networks: Control plane mechanisms and performance evaluation of a traffic control API”, Computer Networks, vol. 44, pp. 513-527, 2004

  • L. Veltri, A. Molinaro, O. Marullo, “DHCP-based authentication for mobile usersterminals in a wireless access network”, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)/, vol. 3124, pp. 1274-1281, 2004

  • S. Giordano, M. Listanti, F. Mustacchio, S. Niccolini, S. Salsano, L. Veltri, “SIP originated dynamic resource configuration in DiffServ networks: SIP COPS traffic control mechanisms”, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 2601, pp. 581-591, 2003

  • A. Floris, L. Veltri, “Access control in IPv6-based roaming scenarios”, IEEE International Conference on Communications, vol. 2, pp. 913-917, 2003

  • A. Floris, L. Tosetti, L. Veltri, “Solutions for mobility support in DHCP-based environments”, IEEE International Conference on Communications, vol. 2, pp. 1043-1047, 2003

  • S. Salsano, L. Veltri, D. Papalilo, “SIP security issues: The SIP authentication procedure and its processing load”, IEEE Network, vol. 16, pp. 38-44, 2002

  • S. Salsano, L. Veltri, “QoS control by means of COPS to support SIP-based applications”, IEEE Network, vol. 16, pp. 27-33, 2002

  • A. Floris, L. Veltri, “Roaming scenarios based on SIP”, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 2496, pp. 302-314, 2002

  • M. Cappiello, A. Floris, L. Veltri, “Mobility amongst heterogeneous networks with AAA support”, IEEE International Conference on Communications, vol. 4, pp. 2064-2069, 2002

  • G. de Marco, S. Loreto, G. Sorrentino, L. Veltri, “SIP-H323: A solution for interworking saving existing architecture”, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 2345, pp. 1111-1116, 2002

  • L. Veltri, “Delay calculus for differentiated services networks”, IEEE International Conference on Communications, vol. 9, pp. 2912-2917, 2001

  • L. Veltri, “Maximum throughput in multicast input queued packet switches”, IEEE International Conference on Communications, vol. 7, pp. 2033-2037, 2001

  • M. Listanti, L. Veltri, “Non blocking generalized three-stage switching networks”, IEEE International Conference on Communications, vol. 2, pp. 642-646, 2001

  • M. Listanti, F. Ricciato, S. Salsano, L. Veltri, “Worst-case analysis for deterministic allocation in a differentiated services network”, Conference Record IEEE Global Telecommunications Conference/, vol. 3, pp. 1554-1559, 2000

  • M. Listanti, L. Veltri, “Non blocking multicast three-stage interconnection networks”, Conference Record IEEE Global Telecommunications Conference/, vol. 2, pp. 1401-1405, 1999

  • A. Detti, M. Listanti, S. Salsano, L. Veltri, “Supporting RSVP in a differentiated service domain: An architectural framework and a scalability analysis”, IEEE International Conference on Communications, vol. 1, pp. 204-210, 1999

  • M. Listanti, L. Veltri, “Blocking probability of three-stage multicast switches”, International Conference on Communications - Proceedings, vol. 1, pp. 623-629, 1998

  • N. Blefari-Melazzi, V. Eramo, M. Listanti, L. Veltri, “Dimensioning of play-out buffers for real time services in a B-ISDN”, 1998 International Zurich Seminar on Broadband Communications: Accessing, Transmission, Networking - Proceedings, vol. 1998-February, pp. 209-218, 1998