IoRT ROS 2 Applications: Evaluating Zenoh and VPN for Robotic Networking in the Edge-Cloud Continuum

2025 - 5th IEEE International Workshop on Distributed Intelligent Systems (DistInSys 2025)" - colocated with IEEE ISCC 2025
Applications in the Internet of Robotic Things (IoRT) add an additional layer of complexity over traditional robotics, namely, networking and communication with the edge and the cloud. The field of cloud robotics has already revolutionized robotic systems, among others, by offloading…

Overlay_dx - Automating forecasting evaluation

2025 - International Conference on Optimization and Learning (OLA2025)

Dynamic Management of Wireless Sensor Networks using Virtual Objects and a Rule Engine

2025 - 28th Conference on Innovation in Clouds, Internet and Networks (ICIN 2025)
In this demonstration paper, we present the implementation of a virtualized Wireless Sensor Network (WSN) following a specific software stack called Virtual Object Stack (VOStack). This stack, proposed by the Horizon Europe (HE) NEPHELE project, promotes openness and interoperability in the Cloud-…

A fuzzy based approach for managing smart edge enhanced IoT devices in mission critical applications

2025 - 28th Conference on Innovation in Clouds, Internet and Networks (ICIN 2025)
In the last decade, edge computing emerged as a paradigm allowing close-to-the-source processing. It brings multiple benefits for mission-critical applications especially that they cannot tolerate delays, downtime or failure. Particularly, in post-disaster management, where the network is scarce…

Online Learning Techniques for Occupancy Detection on Resource Constrained Devices

2025 - Intel4EC 2025 : 3rd International Workshop on Intelligent and Adaptive Edge-Cloud Operations and Services. (In conjunction with IEEE International Parallel & Distributed Processing Symposium 2025)
In light of the increasing impact of climate change, the demand for energy-efficient solutions across various sectors is becoming crucial. This paper explores the feasibility of utilizing Online Learning techniques to detect room occupancy in smart buildings, addressing the challenges of privacy…

Lightweight authenticated key exchange for low-power IoT networks using EDHOC

2025 - Elsevier Internet of Things; Volume 31, May 2025
Energy efficiency is crucial for battery-powered devices in constrained networks, especially in Smart Agriculture and Smart Cities scenarios. To maximize battery life and ensure secure communications, lightweight key exchange protocols like Ephemeral Diffie–Hellman Over COSE (EDHOC) are essential.…

Securing Authentication and Authorization in Computing Continuum

2024 - The 8th International Conference on Mobile Internet Security (MobiSec 2024)
In the era of Computing Continuum, secure and interoperable data sharing across heterogeneous environments is crucial. This research develops innovative cybersecurity components for the computing continuum, integrating the Authentication and Authorization for Constrained Environments (ACE)…

Demo: Virtualized Wireless Sensor Networks for Distributed Applications over the Cloud Continuum

2024 - CIoT24 - 7th Conference on Cloud and Internet of Things
In this demo, the authors present the implementation of a virtualized Wireless Sensor Network following a specific software stack called Virtual Object Stack (VOStack). This stack, proposed by the European Horizon NEPHELE programme, promotes openness and interoperability in the cloud-to-edge-to-IoT…