scispace - formally typeset
S

Sabrina Sicari

Researcher at University of Insubria

Publications -  86
Citations -  6067

Sabrina Sicari is an academic researcher from University of Insubria. The author has contributed to research in topics: Wireless sensor network & Key distribution in wireless sensor networks. The author has an hindex of 20, co-authored 73 publications receiving 5199 citations. Previous affiliations of Sabrina Sicari include Applied Science Private University & University of Catania.

Papers
More filters
Journal ArticleDOI

Internet of things: Vision, applications and research challenges

TL;DR: A survey of technologies, applications and research challenges for Internetof-Things is presented, in which digital and physical entities can be linked by means of appropriate information and communication technologies to enable a whole new class of applications and services.
Journal ArticleDOI

Security, privacy and trust in Internet of Things

TL;DR: In this article, the authors present the main research challenges and the existing solutions in the field of IoT security, identifying open issues and suggesting some hints for future research, and suggest some hints to future research.
Journal ArticleDOI

IoT-aided robotics applications

TL;DR: The present contribution provides a solid state of the art on the main topics related to IoT-aided robotics services: communication networks, robotics applications in distributed and pervasive environments, semantic-oriented approaches to consensus, and network security.
Journal ArticleDOI

A security-and quality-aware system architecture for Internet of Things

TL;DR: This paper introduces a novel IoT architecture able to support security, privacy and data quality guarantees, thereby effectively boosting the diffusion of IoT services.
Journal ArticleDOI

A secure and quality-aware prototypical architecture for the Internet of Things

TL;DR: A lightweight and cross-domain prototype of a distributed architecture for IoT, providing minimum data caching functionality and in-memory data processing and a number of supporting algorithms for the assessment of data quality and security are presented and discussed.