scispace - formally typeset
Search or ask a question
Author

Simone Soderi

Bio: Simone Soderi is an academic researcher from University of Oulu. The author has contributed to research in topics: Wireless & Computer science. The author has an hindex of 8, co-authored 22 publications receiving 137 citations. Previous affiliations of Simone Soderi include Alstom & GE Transportation.

Papers
More filters
Journal ArticleDOI
01 Jul 2017
TL;DR: A watermark‐based blind physical layer security utilizing a jamming receiver in conjunction with the spread spectrum watermarking technique is proposed, which improves the secrecy capacity performance if compared with other protocols, and moreover, it has a lower energy consumption.
Abstract: Wireless communications' infrastructures are frequently selected as a cable replacement in many applications giving an immediate advantage on the wireless investment. However, the worldwide proliferation of wireless local area network (WLAN) imposed large investments on the network security. In the early days of Internet, its layered protocol stack did not consider security as a primary concern. Because then, a significant amount of literature has been published. This paper proposes a watermark-based blind physical layer security utilizing a jamming receiver in conjunction with the spread spectrum watermarking technique. The outage probability of the secrecy capacity is analytically derived, regardless of the eavesdropper position. The theoretical analysis let us draw a secure region around the legitimate receiver. Results indicate how the watermark-based blind physical layer security aims to be a valuable technique for deploying physical layer security. Authors utilized 2 performance metrics, the outage probability of secrecy capacity for assessing the secure communication effectiveness and the error probability for evaluating the watermark extraction process. Finally, the proposed protocol improves the secrecy capacity performance if compared with other protocols, and moreover, it has a lower energy consumption.

27 citations

Patent
30 Nov 2011
TL;DR: In this paper, a vehicle with the capability of estimating its position is provided, where the positioning unit is configured to estimate a coarse position of the vehicle based on data received from the first transceiver, and estimate a fine position based on the second transceiver.
Abstract: There is provided a vehicle with the capability of estimating its position. An exemplary vehicle comprises a positioning unit configured to operate in a first mode for communicating with one or more first radio-responsive devices and operate in a second mode for communicating with one or more second radio responsive devices. The positioning unit is configured to estimate a coarse position of the vehicle based on data received from the first transceiver, and estimate a fine position of the vehicle based on data received from the second transceiver.

21 citations

Proceedings ArticleDOI
17 Mar 2020
TL;DR: This work proposes an innovative scheme in which red, green, blue (RGB) light-emitting-diodes and three color-tuned photo-Diodes (PDs) are used to secure a VLC by using a jamming receiver in conjunction with the spread spectrum watermarking technique.
Abstract: This paper considers improving the confidentiality of the next generation of wireless communications by using the watermark-based blind physical layer security (WBPLSec) in Visible Light Communications (VLCs). Since the growth of wireless applications and service, the demand for a secure and fast data transfer connection requires new technology solutions capable to ensure the best countermeasure against security attacks. VLC is one of the most promising new wireless communication technology, due to the possibility of using environmental artificial lights as data transfer channel in free-space. On the other hand, VLCs are even inherently susceptible to eavesdropping attacks. This work proposes an innovative scheme in which red, green, blue (RGB) light-emitting-diodes (LEDs) and three color-tuned photo-diodes (PDs) are used to secure a VLC by using a jamming receiver in conjunction with the spread spectrum watermarking technique. To the best of the author's knowledge, this is the first work that deals with physical layer security on VLC by using RGB LEDs.

19 citations

Journal ArticleDOI
TL;DR: It is proved that WBPLSec can be used to significantly improve confidentiality in the next generation of wireless communications by using the Watermark Blind Physical Layer Security (WBPLSec) in VLCs.
Abstract: Visible Light Communication (VLC) is a key technology for the sixth-generation (6G) wireless communication thanks to the possibility of using artificial environmental lights as a data transfer channel. Although VLC systems are more resistant against interference and less susceptible to security vulnerabilities like most wireless networks, VLC is even inherently susceptible to eavesdropping attacks. Moreover, since VLC is considered an enabling technology for 6G, specific mechanisms are needed to enforce data security. This paper considers improving the security of the next generation of wireless communications by using the Watermark Blind Physical Layer Security (WBPLSec) in VLCs. The main intuition is that RGB LEDs offer the possibility for Wavelength Division Multiplexing (WDM) as a useful support for the Spread-Spectrum (SS) watermarking. In this paper, we propose an approach that aims at obtaining VLC Physical Layer Security (PLS) by combining watermarking with an RGB LED jamming. We provide a performance analysis of the proposed security architecture based on the secrecy capacity in terms of its existence and outage probability. We prove that WBPLSec can be used to significantly improve confidentiality in the next generation of wireless communications. The results offer the possibility of creating a secure region around the legitimate receiver by leveraging the jamming optical power.

17 citations

Journal ArticleDOI
TL;DR: The results favor the use of the watermark-based blind physical layer security (WBPLSec) as a key enabling technology to protect the confidentiality in wireless sensor networks.
Abstract: Technological advances have proliferated in several sectors by developing additional capabilities in the field of systems engineering. These improvements enabled the deployment of new and smart products. Today, wireless body area networks (WBAN) are commonly used to collect humans’ information, hence this evolution exposes wireless systems to new security threats. Recently, the interest by cyber-criminals in this information has increased. Many of these wireless devices are equipped with passive speakers and microphones that may be used to exchange data with each other. This paper describes the application of the watermark-based blind physical layer security (WBPLSec) to acoustic communications as unconventional wireless link. Since wireless sensors have a limited computation power the WBPLSec is a valuable physical layer standalone solution to save energy. Actually, this protocol does not need any additional radio frequency (RF) connection. Indeed, it combines watermarking and a jamming techniques over sound-waves to create secure region around the legitimate receiver. Due to their nature, wireless communications might experience eavesdropping attacks. The analysis proposed in this paper, addresses countermeasures against confidentiality attacks on short-range wireless communications. The experiments over the acoustic air-gap channel showed that WBPLSec can create a region two meters wide in which wireless nodes are able to communicate securely. Therefore, the results favor the use of this scheme as a key enabling technology to protect the confidentiality in wireless sensor networks.

17 citations


Cited by
More filters
Journal ArticleDOI
23 Jan 2020
TL;DR: A thorough survey on the historical process and status quo of V2X technologies, as well as demonstration of emerging technology developing directions toward IoV can provide beneficial insights and inspirations for both academia and the IoV industry.
Abstract: To enable large-scale and ubiquitous automotive network access, traditional vehicle-to-everything (V2X) technologies are evolving to the Internet of Vehicles (IoV) for increasing demands on emerging advanced vehicular applications, such as intelligent transportation systems (ITS) and autonomous vehicles. In recent years, IoV technologies have been developed and achieved significant progress. However, it is still unclear what is the evolution path and what are the challenges and opportunities brought by IoV. For the aforementioned considerations, this article provides a thorough survey on the historical process and status quo of V2X technologies, as well as demonstration of emerging technology developing directions toward IoV. We first review the early stage when the dedicated short-range communications (DSRC) was issued as an important initial beginning and compared the cellular V2X with IEEE 802.11 V2X communications in terms of both the pros and cons. In addition, considering the advent of big data and cloud-edge regime, we highlight the key technical challenges and pinpoint the opportunities toward the big data-driven IoV and cloud-based IoV, respectively. We believe our comprehensive survey on evolutionary V2X technologies toward IoV can provide beneficial insights and inspirations for both academia and the IoV industry.

348 citations

Journal ArticleDOI
TL;DR: This paper surveys the networking and communication technologies in autonomous driving from two aspects: intra- and inter-vehicle.
Abstract: The development of light detection and ranging, Radar, camera, and other advanced sensor technologies inaugurated a new era in autonomous driving. However, due to the intrinsic limitations of these sensors, autonomous vehicles are prone to making erroneous decisions and causing serious disasters. At this point, networking and communication technologies can greatly make up for sensor deficiencies, and are more reliable, feasible and efficient to promote the information interaction, thereby improving autonomous vehicle’s perception and planning capabilities as well as realizing better vehicle control. This paper surveys the networking and communication technologies in autonomous driving from two aspects: intra- and inter-vehicle. The intra-vehicle network as the basis of realizing autonomous driving connects the on-board electronic parts. The inter-vehicle network is the medium for interaction between vehicles and outside information. In addition, we present the new trends of communication technologies in autonomous driving, as well as investigate the current mainstream verification methods and emphasize the challenges and open issues of networking and communications in autonomous driving.

335 citations

Journal ArticleDOI
07 Apr 2021
TL;DR: In this paper, the authors provide a comprehensive survey of the current developments towards 6G and elaborate the requirements that are necessary to realize the 6G applications, and summarize lessons learned from state-of-the-art research and discuss technical challenges that would shed a new light on future research directions toward 6G.
Abstract: Emerging applications such as Internet of Everything, Holographic Telepresence, collaborative robots, and space and deep-sea tourism are already highlighting the limitations of existing fifth-generation (5G) mobile networks. These limitations are in terms of data-rate, latency, reliability, availability, processing, connection density and global coverage, spanning over ground, underwater and space. The sixth-generation (6G) of mobile networks are expected to burgeon in the coming decade to address these limitations. The development of 6G vision, applications, technologies and standards has already become a popular research theme in academia and the industry. In this paper, we provide a comprehensive survey of the current developments towards 6G. We highlight the societal and technological trends that initiate the drive towards 6G. Emerging applications to realize the demands raised by 6G driving trends are discussed subsequently. We also elaborate the requirements that are necessary to realize the 6G applications. Then we present the key enabling technologies in detail. We also outline current research projects and activities including standardization efforts towards the development of 6G. Finally, we summarize lessons learned from state-of-the-art research and discuss technical challenges that would shed a new light on future research directions towards 6G.

273 citations

Journal ArticleDOI
TL;DR: A comprehensive survey of the recent works on cooperative relaying and jamming techniques for securing wireless transmissions against eavesdropping nodes, which attempt to intercept the transmissions.
Abstract: Physical layer security (PLS) has been extensively explored as an alternative to conventional cryptographic schemes for securing wireless links. Many studies have shown that the cooperation between the legitimate nodes of a network can significantly enhance their secret communications performance, relative to the noncooperative case. Motivated by the importance of this class of PLS systems, this paper provides a comprehensive survey of the recent works on cooperative relaying and jamming techniques for securing wireless transmissions against eavesdropping nodes, which attempt to intercept the transmissions. First, it provides a in-depth overview of various secure relaying strategies and schemes. Next, a review of recently proposed solutions for cooperative jamming techniques is provided with an emphasis on power allocation and beamforming techniques. Then, the latest developments in hybrid techniques, which use both cooperative relaying and jamming, are elaborated. Finally, several key challenges in the domain of cooperative security are presented along with an extensive discussion on the applications of cooperative security in key enablers for 5G communications, such as nonorthogonal multiple access, device-to-device communications, and massive multiple-input multiple-output systems.

207 citations

Journal ArticleDOI
10 May 2021
TL;DR: In this paper, the authors provide a vision on 6G security and security key performance indicators with the tentative threat landscape based on the foreseen 6G network architecture, and discuss the security and privacy challenges that may encounter with the available 6G requirements and potential 6G applications.
Abstract: Although the fifth generation (5G) wireless networks are yet to be fully investigated, the visionaries of the 6th generation (6G) echo systems have already come into the discussion. Therefore, in order to consolidate and solidify the security and privacy in 6G networks, we survey how security may impact the envisioned 6G wireless systems, possible challenges with different 6G technologies, and the potential solutions. We provide our vision on 6G security and security key performance indicators (KPIs) with the tentative threat landscape based on the foreseen 6G network architecture. Moreover, we discuss the security and privacy challenges that may encounter with the available 6G requirements and potential 6G applications. We also give the reader some insights into the standardization efforts and research-level projects relevant to 6G security. In particular, we discuss the security considerations with 6G enabling technologies such as distributed ledger technology (DLT), physical layer security, distributed AI/ML, visible light communication (VLC), THz, and quantum computing. All in all, this work intends to provide enlightening guidance for the subsequent research of 6G security and privacy at this initial phase of vision towards reality.

118 citations