Contact Information
Phone number: +39 080 5963913
Email: gennaro.boggia@poliba.it
Teaching
Signal Theory
Telecommunication Networks
Radiocommunication Networks
Research Topics
Gennaro Boggia
Full Professor
Polytechnic University of Bari
Gennaro Boggia received, with honors, the Dr. Eng. and Ph.D. degrees in electronics engineering, both from the Politecnico di Bari, Bari, Italy, in Jul. 1997 and Mar. 2001, respectively. Since Sep. 2002, he has been with the Department of Electrical and Information Engineering, Politecnico di Bari, where he is currently an Associate Professor. From May 1999 to December 1999, he was a Visiting Researcher with the TILab, TelecomItalia Lab, Torino, Italy, where he was involved in the study of the core network for the evolution of 3G cellular systems. In 2007, he was a Visiting Researcher at FTW, Vienna, Austria, where he was involved in activities on passive and active traffic monitoring in 3G networks. During his activity, he got the following awards: Best paper Award at IEEE ICUMT Conf., 2015; AICA 2014 Honorable mention for innovation and originality to the PhD.thesis “Advanced services and performance assessment in Information Centric Networks”; Ph.D. Student: Ilaria CIANCI; Highly accesses paper in 2013 in the EURASIP Journal on Wireless Commun. and Networking; Best Paper Award “Francesco Carassa” at the GTTI 2012 annual meeting; Elevation to the grade of IEEE Senior Member in 2009; Best paper Award at IEEE VTC Fall Conf., 2004. He has authored or coauthored more than 150 papers in int. journals or conference proceedings, gaining more than 2300 citations. He is active in the IETF ICNRG WG and in the IEEE WG 6TiSCH. He is also regularly involved as a Member of the Technical Program Committee of many prestigious international conferences.
Dr. Boggia is currently an Associate Editor for the IEEE Commun. Mag., the ETT Wiley Journal, and the Springer Wireless Networks journal.
Research Topics
Publications
2023
Muhammad Tauseef Mushtaq, Nicola Cordeschi, Gennaro Boggia, Luigi Alfredo Grieco
Optimized Scheduling of Packets with Deep Sensing Irregular Slotted Aloha Influenced by Channel Knowledge for Wireless-Powered IoT Networks Proceedings Article
In: International Conference on Information and Communication Technologies for Disaster Management (ICT-DM) (ICT-DM'23), pp. 4, Cosenza, Italy, 2023, (2nd Best Paper).
BibTeX | Links:
@inproceedings{Mush2309Optimized,
title = {Optimized Scheduling of Packets with Deep Sensing Irregular Slotted Aloha Influenced by Channel Knowledge for Wireless-Powered IoT Networks},
author = {Muhammad Tauseef Mushtaq and Nicola Cordeschi and Gennaro Boggia and Luigi Alfredo Grieco},
url = {https://telematics.poliba.it/wp-content/uploads/publications/2023/Mush2309Optimized.pdf},
year = {2023},
date = {2023-09-01},
urldate = {2023-09-01},
booktitle = {International Conference on Information and Communication Technologies for Disaster Management (ICT-DM) (ICT-DM'23)},
pages = {4},
address = {Cosenza, Italy},
note = {2nd Best Paper},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Federica de Trizio, Giancarlo Sciddurlo, Giuseppe Piro, Domenico Striccoli, Ilaria Cianci, Gennaro Boggia
Surviving Disaster Events Via Dynamic In-Network Processing Assisted by Network Digital Twins Proceedings Article
In: International Conference on Information and Communication Technologies for Disaster Management (ICT-DM) (ICT-DM'23), pp. 5.95, Cosenza, Italy, 2023.
BibTeX | Links:
@inproceedings{deTr2309Surviving,
title = {Surviving Disaster Events Via Dynamic In-Network Processing Assisted by Network Digital Twins},
author = {Federica {de Trizio} and Giancarlo Sciddurlo and Giuseppe Piro and Domenico Striccoli and Ilaria Cianci and Gennaro Boggia},
url = {https://telematics.poliba.it/wp-content/uploads/publications/2023/deTr2309Surviving.pdf},
doi = {10.1109/ICT-DM58371.2023.10286937},
year = {2023},
date = {2023-09-01},
urldate = {2023-09-01},
booktitle = {International Conference on Information and Communication Technologies for Disaster Management (ICT-DM) (ICT-DM'23)},
pages = {5.95},
address = {Cosenza, Italy},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Antonio Petrosino, Domenico Striccoli, Oleksandr Romanov, Gennaro Boggia, Luigi Alfredo Grieco
Light Fidelity for Internet of Things: A Survey Journal Article
In: Optical Switching and Networking, pp. 100732, 2023.
BibTeX | Links:
@article{Petrosino2023Light,
title = {Light Fidelity for Internet of Things: A Survey},
author = {Antonio Petrosino and Domenico Striccoli and Oleksandr Romanov and Gennaro Boggia and Luigi Alfredo Grieco},
url = {https://telematics.poliba.it/wp-content/uploads/publications/2023/LiFi_for_IoT___Survey__Elsevier.pdf},
doi = {https://doi.org/10.1016/j.osn.2023.100732},
year = {2023},
date = {2023-01-01},
journal = {Optical Switching and Networking},
pages = {100732},
publisher = {Elsevier},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Ingrid Huso, Daniele Sparapano, Giuseppe Piro, Gennaro Boggia
Privacy-preserving data dissemination scheme based on Searchable Encryption, publish-subscribe model, and edge computing Journal Article
In: Computer Communications (Elsevier), vol. 203, pp. 262-275, 2023, ISSN: 0140-3664.
BibTeX | Links:
@article{HUSO2023,
title = {Privacy-preserving data dissemination scheme based on Searchable Encryption, publish-subscribe model, and edge computing},
author = {Ingrid Huso and Daniele Sparapano and Giuseppe Piro and Gennaro Boggia},
url = {https://telematics.poliba.it/wp-content/uploads/publications/2023/23HusoPrivacyComCom.pdf},
doi = {https://doi.org/10.1016/j.comcom.2023.03.006},
issn = {0140-3664},
year = {2023},
date = {2023-01-01},
journal = {Computer Communications (Elsevier)},
volume = {203},
pages = {262-275},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Vittoria Musa, Giuseppe Piro, Luigi Alfredo Grieco, Gennaro Boggia
An Optimized Energy-Harvesting Transmission Scheme for Diffusion-Based Molecular Communications Journal Article
In: IEEE Transactions on NanoBioscience, vol. 22, no. 2, pp. 345-355, 2023, (doi: https://doi.org/10.1109/TNB.2022.3190301).
BibTeX | Links:
@article{MusaIEEETNB2022,
title = {An Optimized Energy-Harvesting Transmission Scheme for Diffusion-Based Molecular Communications},
author = {Vittoria Musa and Giuseppe Piro and Luigi Alfredo Grieco and Gennaro Boggia},
url = {https://telematics.poliba.it/wp-content/uploads/publications/2022/MusaIEEETNB2022_PREPRINT.pdf},
doi = {https://doi.org/10.1109/TNB.2022.3190301},
year = {2023},
date = {2023-01-01},
journal = {IEEE Transactions on NanoBioscience},
volume = {22},
number = {2},
pages = {345-355},
note = {doi: https://doi.org/10.1109/TNB.2022.3190301},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Antonio Petrosino, Giuseppe Piro, Luigi Alfredo Grieco, Gennaro Boggia
On the Optimal Deployment of Virtual Network Functions in Non-Terrestrial Segments Journal Article
In: IEEE Transactions on Network and Service Management, 2023.
BibTeX | Links:
@article{Petrosino2023On,
title = {On the Optimal Deployment of Virtual Network Functions in Non-Terrestrial Segments},
author = {Antonio Petrosino and Giuseppe Piro and Luigi Alfredo Grieco and Gennaro Boggia},
url = {https://telematics.poliba.it/wp-content/uploads/publications/2023/Petrosino2023OnTheOptimal.pdf},
doi = {10.1109/TNSM.2023.3275248},
year = {2023},
date = {2023-01-01},
journal = {IEEE Transactions on Network and Service Management},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
2022
Giuseppe Ungaro, Francesco Ricchitelli, Ingrid Huso, Giuseppe Piro, Gennaro Boggia
Design and Implementation of a Lawful Interception Architecture for B5G Systems Based on Key Escrow Proceedings Article
In: 2022 IEEE Conference on Standards for Communications and Networking (CSCN)(CSCN'22), Thessaloniki, Greece, 2022.
BibTeX | Links:
@inproceedings{Unga2211:Implementation,
title = {Design and Implementation of a Lawful Interception Architecture for B5G Systems Based on Key Escrow},
author = {Giuseppe Ungaro and Francesco Ricchitelli and Ingrid Huso and Giuseppe Piro and Gennaro Boggia},
url = {https://telematics.poliba.it/wp-content/uploads/publications/2022/Unga2211.pdf},
year = {2022},
date = {2022-11-01},
booktitle = {2022 IEEE Conference on Standards for Communications and Networking (CSCN)(CSCN'22)},
address = {Thessaloniki, Greece},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Giovanni Grieco, Domenico Striccoli, Giuseppe Piro, Raffaele Bolla, Gennaro Boggia, Luigi Alfredo Grieco
Authentication and Authorization in Cyber-Security Frameworks: a Novel Approach for Securing Digital Service Chains Proceedings Article
In: 2022 IEEE 8th International Conference on Network Softwarization (NetSoft), pp. 468-473, Milan, Italy, 2022, (doi:10.1109/NetSoft54395.2022.9844030).
BibTeX | Links:
@inproceedings{Grieco2022:Authentication,
title = {Authentication and Authorization in Cyber-Security Frameworks: a Novel Approach for Securing Digital Service Chains},
author = {Giovanni Grieco and Domenico Striccoli and Giuseppe Piro and Raffaele Bolla and Gennaro Boggia and Luigi Alfredo Grieco},
url = {https://telematics.poliba.it/wp-content/uploads/publications/2022/grieco2022authentication.pdf},
year = {2022},
date = {2022-07-01},
booktitle = {2022 IEEE 8th International Conference on Network Softwarization (NetSoft)},
pages = {468-473},
address = {Milan, Italy},
note = {doi:10.1109/NetSoft54395.2022.9844030},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Giancarlo Sciddurlo, Antonio Petrosino, Domenico Striccoli, Giuseppe Piro, Luigi Alfredo Grieco, Gennaro Boggia
Boosting Service Provisioning in SIoT by Exploiting Trust and Capability Levels of Social Objects Proceedings Article
In: Proc. of IEEE Workshop on Smart Service Systems (SmartSys), Espoo, Finland, 2022.
BibTeX | Links:
@inproceedings{Sciddurlo2022Boosting,
title = {Boosting Service Provisioning in SIoT by Exploiting Trust and Capability Levels of Social Objects},
author = {Giancarlo Sciddurlo and Antonio Petrosino and Domenico Striccoli and Giuseppe Piro and Luigi Alfredo Grieco and Gennaro Boggia},
url = {https://telematics.poliba.it/wp-content/uploads/publications/2022/Sciddurlo2022boosting.pdf},
year = {2022},
date = {2022-06-01},
booktitle = {Proc. of IEEE Workshop on Smart Service Systems (SmartSys)},
address = {Espoo, Finland},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Ingrid Huso, Giuseppe Piro, Gennaro Boggia
Distributed and Privacy-Preserving Data Dissemination at the Network Edgevia Attribute-Based Searchable Encryption Proceedings Article
In: Proc. of Mediterranean Communication and Computer Networking Conference (MedComNet), Paphos, Cyprus, 2022.
@inproceedings{Huso2205:Distributed,
title = {Distributed and Privacy-Preserving Data Dissemination at the Network Edgevia Attribute-Based Searchable Encryption},
author = {Ingrid Huso and Giuseppe Piro and Gennaro Boggia},
url = {https://telematics.poliba.it/wp-content/uploads/publications/2022/Huso2205distributed.pdf},
year = {2022},
date = {2022-05-01},
booktitle = {Proc. of Mediterranean Communication and Computer Networking Conference (MedComNet)},
address = {Paphos, Cyprus},
abstract = {Multi-Access Edge computing represents one of the most important enabling
technologies for the Industrial Internet of Things. It allows advanced data
processing and customized service provisioning, very close to the
end-users. In the presence of many Multi-Access Edge computing
applications, however, it is fundamental to ensure effective and
privacy-preserving data dissemination at the network edge. From the
security perspective, Attribute-based Encryption and Searchable Encryption
techniques can be jointly used to achieve data confidentiality, flexible
protection against unauthorized access, and privacy-preserving data
dissemination.
Available solutions, however, generally focus the attention on cloud-based
approaches, use edge computing to implement some of the cryptographic
tasks, and limit the investigation to single cryptographic operations.
Indeed, no works investigate the adoption of these techniques in scenarios
with multiple data producers and end-users, and fully operating at the
network edge. To bridge this gap, this work proposes a novel methodology
supporting fast and privacy-oriented data dissemination directly at the
network edge. In the considered distributed network infrastructure,
Multi-Access Edge computing applications express the interest to receive
specific data by sending Trapdoors to Edge Servers. Data sources protect
their contents through Attribute-based Encryption and deliver them to Edge
Servers. In turn, Edge Servers implement Attribute-based Searchable
Encryption functionalities to properly disseminate received contents
towards Multi-Access Edge nodes hosting the applications that generated
valid Trapdoors. The performance of the conceived approach has been
evaluated through computer simulations. Obtained results highlight the
benefits achieved against baseline (i.e., cloud-based) solutions.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
technologies for the Industrial Internet of Things. It allows advanced data
processing and customized service provisioning, very close to the
end-users. In the presence of many Multi-Access Edge computing
applications, however, it is fundamental to ensure effective and
privacy-preserving data dissemination at the network edge. From the
security perspective, Attribute-based Encryption and Searchable Encryption
techniques can be jointly used to achieve data confidentiality, flexible
protection against unauthorized access, and privacy-preserving data
dissemination.
Available solutions, however, generally focus the attention on cloud-based
approaches, use edge computing to implement some of the cryptographic
tasks, and limit the investigation to single cryptographic operations.
Indeed, no works investigate the adoption of these techniques in scenarios
with multiple data producers and end-users, and fully operating at the
network edge. To bridge this gap, this work proposes a novel methodology
supporting fast and privacy-oriented data dissemination directly at the
network edge. In the considered distributed network infrastructure,
Multi-Access Edge computing applications express the interest to receive
specific data by sending Trapdoors to Edge Servers. Data sources protect
their contents through Attribute-based Encryption and deliver them to Edge
Servers. In turn, Edge Servers implement Attribute-based Searchable
Encryption functionalities to properly disseminate received contents
towards Multi-Access Edge nodes hosting the applications that generated
valid Trapdoors. The performance of the conceived approach has been
evaluated through computer simulations. Obtained results highlight the
benefits achieved against baseline (i.e., cloud-based) solutions.
Awards
Sorry, no publications matched your criteria.