- Blockchain Technology Applications and Security
- IoT and Edge/Fog Computing
- Advanced Optical Network Technologies
- Advanced MIMO Systems Optimization
- Optical Network Technologies
- Chaos-based Image/Signal Encryption
- Advanced Wireless Network Optimization
- Advanced Photonic Communication Systems
- Seismology and Earthquake Studies
- Cryptographic Implementations and Security
- Cooperative Communication and Network Coding
- Computability, Logic, AI Algorithms
- Software-Defined Networks and 5G
- Advanced Authentication Protocols Security
- Internet Traffic Analysis and Secure E-voting
- Integrated Circuits and Semiconductor Failure Analysis
- Advanced Wireless Communication Technologies
- Advanced Malware Detection Techniques
- Digital Transformation in Industry
- Wireless Communication Security Techniques
- Physical Unclonable Functions (PUFs) and Hardware Security
- Caching and Content Delivery
- IPv6, Mobility, Handover, Networks, Security
- Cloud Computing and Resource Management
- VLSI and Analog Circuit Testing
University of Patras
2011-2024
Research Academic Computer Technology Institute
2014-2023
Iquadrat (Spain)
2023
University of Surrey
2016
The authors give an overview on the state of art potential security issues that occur in deployment LTE/SAE (Long-Term Evolution/System Architecture Evolution) protocol emerging 4G wireless technologies. Although concerns and challenges networks will remain a hot topic future, standard could adapt to these rising challenges, becoming more robust secure. By looking at authentication ciphering algorithms, such as EAP-AKA (Extensible Authentication Protocol for Key Agreement), currently...
Virtual Reality (VR)/Metaverse is transforming into a ubiquitous technology by leveraging smart devices to provide highly immersive experiences at an affordable price. Cryptographically securing such augmented reality schemes of paramount importance. Securely transferring the same secret key, i.e., obfuscated, between several parties main issue with symmetric cryptography, workhorse modern cryptography because its ease use and quick speed. Typically, asymmetric establishes shared parties,...
With the faster maturity and stability of digitization, connectivity edge technologies, number Internet Things (IoT) devices sensors is flourishing fast in important junctions such as homes, hotels, hospitals, retail stores, manufacturing floors, railway stations, airports, oil wells, warehouses, etc. However, this extremely connected world, security implications for IoT are getting worse with constant rise malicious cyberattacks. The challenge how to secure sensors, services data....
In this paper, we present approaches to generating random numbers, along with potential applications. Rather than trying provide extensive coverage of several techniques or algorithms that have appeared in the scientific literature, focus on some representative approaches, presenting their workings and properties detail. Our goal is delineate strengths weaknesses, as well application domains, so reader can judge what would be best approach for at hand, possibly a combination available...
The whole security architecture of LTE/SAE (Long Term Evolution/System Architecture Evolution) is being consisted four main hardware-oriented cryptographic algorithms: KASUMI block ciphers, SNOW-3G stream cipher, the MILENAGE algorithm set, and 4G development ZUC algorithm. This paper presents an FPGA deployment a universal crypto processor for LTE, consisting both ciphers enabling each one on demand, which based two novel design principles. One more intelligent implementation algorithm's...
This work presents a new converged access architecture for LTE mobile backhaul networks. In the proposed architecture, evolved NodeBs (eNBs) are interconnected with local ring-based wavelength-division-multiplexed (WDM) passive optical networks (PONs), which aggregate and efficiently transport traffic to packet core (EPC). The WDM-PON ring design supports dynamic setup of virtual circuits inter-base-station communication, over dedicated λLAN channel. It also load balancing, by dynamically...
Distributed Ledger Technologies (DLT) are based on the Blockchain concept and have been specifically designed for enterprise-level devices with acceptable computing powers network bandwidth. Direct Acyclic Graph (DAG) ledger(s) is a new form of DLT technology Internet-of- Things (IoT) due to nature its disadvantages limited IOTA DAG-based implementation IoT applications that has gained an increased attention in recent years. One major concerns hindering wide adaptation security concerns....
The Blockchain concept is often mostly associated with Bitcoin and monetary transactions, however, the technology has enormous potential for several industries including space sector. Cybersecurity enhancement plays a detrimental role in critical core operations inside functional flow: from supply chain, satellite orbital tracking, digital communications efficacy. increasing adaption of connected highly advanced technologies exposes satellites, aeronautical drones, vehicles, ground stations...
A contemporary technique for calculating seismic risk is earthquake nowcasting (EN), which analyzes the progression of (EQ) cycle in fault systems. 'Natural time' a novel idea time that serves as foundation EN assessment. The potential score (EPS), has been discovered to have useful uses regionally and worldwide, unique tool predict risk. For estimation EPS occurrences with highest magnitude among these applications, we since 2021 concentrated on Greece territory, applying...
A contemporary technique for calculating seismic risk is earthquake nowcasting (EN), which analyzes the progression of (EQ) cycle in fault systems. 'Natural time' a novel idea time that serves as foundation EN assessment. The potential score (EPS), has been discovered to have useful uses regionally and worldwide, unique tool predict risk. For estimation EPS occurrences with highest magnitude among these applications, we since 2021 concentrated on Greece territory, applying sophisticated...
this paper we present approaches for generating random numbers along with potential applications. Rather than trying to provide extensive coverage of several techniques or algorithms that have appeared in the scientific literature, focus on some representative presenting their workings and properties detail. Our goal is delineate strengths weaknesses as well application domains so reader can judge what would be best approach
 hand, possibly a combination available approaches. For...
In this paper the problem of IP watermark proof is attacked by a new technique applied at state machine level along with assisting hardware. Experiments on benchmark circuits and an example system-on-chip (SoC) indicate that overhead proposed delay area negligible extremely small respectively.
The recent emergence of ultra-high-speed and high-definition data video services has pushed wireless network capacity to its limits. Cellular is therefore a valuable resource, whereas indoor coverage poses itself as challenging issue. At the same time, real-world paradigms multimedia transmission require effective Quality-of-Service (QoS) provisioning well power admission. To confront issues like delay-sensitive QoS requirements traffic provisioning, meet mobile customer needs, this paper...
Orthogonal frequency-division multiple-access (OFDMA) small-cell networks of next-generation Long-Term Evolution (LTE-Advanced) standard, is perhaps a key factor to efficiently provide beneficial usage expensive radio resources, while maintaining adequate network capacity. Network capacity without doubt critical resource for LTE networks. At the same time, real-time multimedia transmission requires effective quality-of-service (QoS) provisioning, as well power admission. This paper proposes...
Sixth generation (6G)-enabled massive network MANO orchestration, alongside distributed supervision and fully reconfigurable control logic that manages dynamic arrangement of components, such as cell-free, Open-Air Interface (OAI) RIS, is a potent enabler for the upcoming pervasive digitalization vertical use cases. In disruptive domain, artificial intelligence (AI)-driven zero-touch "Network Networks" intent-based automation shall be able to guarantee high degree security, efficiency,...
It is widely accepted that GMPLS (Generalized MPLS) will be a key technology in the evolution of next generation reliable Internet Protocol (IP) backbone networks. Conventional GMPLS-based optical-switching network fault recovery only provides resiliency terms path segment selection instead constraint-based calculation. This can create severe impact on protocol's transport plane when occurs to link or with many optical connections attached it. paper proposes implementation an improved...
The challenges of transferring cybersecurity technologies are varied and span a wide range from detailed technical issues to market, sales, production issues.It often seems that there is an art successfully crossing the great divide.Are cybersecurity-specific make technology transfer more difficult?