30th IEEE Symposium on Computers and Communications (ISCC)
IEEE ISCC 2025 | 2 - 5 July, Bologna Italy
Computers and Communications for the benefits of Humanity

TUTORIALS

1. Novel Computing Paradigms for the Future IoT

Abstract: The Internet of Things (IoT) has rapidly expanded, with applications spanning industrial
automation, smart cities, healthcare, logistics, etc. By 2030, the IoT landscape is expected to host over 1
trillion devices, ranging from simple wearables to advanced UAVs. These devices will be connected
through different network technologies. Also, they will demand diverse Quality of Service (QoS)
requirements, in terms of latency, reliability, and security. The integration of Artificial Intelligence (AI)
services along the Cloud-to-Things Continuum will necessitate new paradigms for computing,
communication, and resource management, while addressing sustainability challenges such as energy
efficiency, device disposal, and environmental impact. To address these challenges, this tutorial explores
key advancements and strategies shaping the Pervasive IoT. Topics include: battery-less IoT and
intermittent computing; the emergence of new communication technologies (such as 6G, WiFi7, and LiFi)
to support diverse application scenarios; and the Cloud-to-Things Continuum (C2TC) for scalable and
efficient resource management. Strategies for optimal joint computing-network resource allocation and
dynamic service reconfiguration, will be required to ensure QoS compliance for critical applications, even
in dynamic environments. By surveying the latest research and discussing open issues, this tutorial aims
to provide insights into the innovative approaches shaping the future Pervasive IoT ecosystem.

Instructors: 

 

 

 

 

Giuseppe Anastasi       Francesca Righetti

2. From Automation to Orchestration: The New Frontiers of Network Softwarization

Abstract: The importance of software in communication environments has significantly increased over
the past decades, thanks to the widespread adoption of virtualization techniques, Cloud-native solutions,
and advancements such as service-based architecture, user/control plane decoupling, and network slicing,
giving rise to the concept of Network Softwarization. Software-defined Networking (SDN) advocates for
a logically centralized view of network infrastructure and resources, utilizing open, standardized
interfaces to control packet processing and forwarding. Network Function Virtualization (NFV) imagines
software-based network elements and functions, applying a Cloud-like (*aaS) approach to virtualized
network infrastructures, offering benefits such as scalability, elasticity, mobility, and replicability. These
concepts collectively contribute to Network Programmability, facilitating a programmatic approach to
network resource management and service deployment. The goal of this tutorial is twofold: on one side, to
review how network management and automation evolved towards a more comprehensive network
orchestration approach; on the other side, to show participants that they too can be part of this software
(r)evolution in communication networks, demonstrating how easy it can be to “build your own SDN
controller” leveraging the available architectures and technologies. This tutorial will address current challenges
of network orchestration, such as interoperability and automation across multi-vendor, multi-technology
environments characterized by dynamic resource availability, typical of edge/fog computing scenarios.
Then, to effectively meet the demands of network orchestration, the idea of disaggregating the
network control plane will be illustrated, and a playground framework will be introduced for the design
and evaluation of microservice-based SDN controllers, demonstrating how to use it to effectively develop
and test customized functionalities for a fully fledged SDN controller running in a sandboxed
environment. The ultimate objective is to facilitate participants in understanding the current developments
and best practices – and anticipating the upcoming ones – in network softwarization, so that they can
drive innovation in their field of work.

Instructors:

 

 

 

 

Gianluca Davoli,           Domenico Scotece,      Luca Foschini,               Walter Cerroni

3. Attested TLS and Formalization

Abstract: Transport Layer Security (TLS) is a widely used protocol for secure channel establishment.
However, TLS lacks any inherent mechanism for validating the security state of the endpoint software and
its platform. To overcome this limitation, recent works have combined remote attestation (RA) and TLS,

named attested TLS. We present the state-of-the-art attested TLS protocols in an emerging application
domain, namely confidential computing, and use federated learning as the running example. We present
an approach based on ProVerif to discover attacks on such protocols. After introducing network security
(via TLS 1.3) and endpoint security (via RA), the tutorial explores the ways to combine the two protocols.
Then, we introduce formal methods and the approach to discover protocol-level attacks in attested TLS
protocols. Finally, we present open research problems in this domain for the attendees.

Instructor:

 

 

 

 

Muhammad Usama Sardar

4. Integrating Quantum Security in 6G Communication Systems: A Conceptual Framework 

Abstract: The tutorial will cover an in-depth study of the convergence of post-quantum cryptography
(PQC) and quantum key distribution (QKD) in the 6G domain. The first part will provide background
information on PQC, QKD, and B5G, and the second part will discuss the integration of these
technologies into the 6G network architecture. In the second part, there will be a step-by-step
demonstration of PQC integration within the user equipment communications and registration processes.
There will also be a QKD demonstration in which the secure key exchange will be implemented and run
within the quantum simulation environment. The participants do not need to have any prerequisite
components. Application of PQC and QKD concepts in the security of telecommunication networks is an
emerging topic and will be very important in the coming years as well for the development of secure 6G
networks. The attendees of this tutorial will have the chance to learn more about security threats and
potential techniques to provide defense against them from the perspective of 6G network infrastructures.
Some special features of this tutorial are a clear link between the PQC and QKD ideas (including proper
algorithm selection and establishing quantum channels) and recent developments in PQC, an overview of
standardization efforts in 6G, and how these can improve the security of telecommunications networks.

Instructors:

 

 

 

 

Engin Zeydan,               Abdullah Aydeger