Anastasios N. Bikos

ORCID: 0000-0001-6236-1707
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Blockchain Technology Applications and Security
  • IoT and Edge/Fog Computing
  • Advanced Optical Network Technologies
  • Advanced MIMO Systems Optimization
  • Optical Network Technologies
  • Chaos-based Image/Signal Encryption
  • Advanced Wireless Network Optimization
  • Advanced Photonic Communication Systems
  • Seismology and Earthquake Studies
  • Cryptographic Implementations and Security
  • Cooperative Communication and Network Coding
  • Computability, Logic, AI Algorithms
  • Software-Defined Networks and 5G
  • Advanced Authentication Protocols Security
  • Internet Traffic Analysis and Secure E-voting
  • Integrated Circuits and Semiconductor Failure Analysis
  • Advanced Wireless Communication Technologies
  • Advanced Malware Detection Techniques
  • Digital Transformation in Industry
  • Wireless Communication Security Techniques
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Caching and Content Delivery
  • IPv6, Mobility, Handover, Networks, Security
  • Cloud Computing and Resource Management
  • VLSI and Analog Circuit Testing

University of Patras
2011-2024

Research Academic Computer Technology Institute
2014-2023

Iquadrat (Spain)
2023

University of Surrey
2016

The authors give an overview on the state of art potential security issues that occur in deployment LTE/SAE (Long-Term Evolution/System Architecture Evolution) protocol emerging 4G wireless technologies. Although concerns and challenges networks will remain a hot topic future, standard could adapt to these rising challenges, becoming more robust secure. By looking at authentication ciphering algorithms, such as EAP-AKA (Extensible Authentication Protocol for Key Agreement), currently...

10.1109/msp.2012.136 article EN IEEE Security & Privacy 2013-03-01

Virtual Reality (VR)/Metaverse is transforming into a ubiquitous technology by leveraging smart devices to provide highly immersive experiences at an affordable price. Cryptographically securing such augmented reality schemes of paramount importance. Securely transferring the same secret key, i.e., obfuscated, between several parties main issue with symmetric cryptography, workhorse modern cryptography because its ease use and quick speed. Typically, asymmetric establishes shared parties,...

10.20944/preprints202502.1952.v1 preprint EN 2025-02-25

With the faster maturity and stability of digitization, connectivity edge technologies, number Internet Things (IoT) devices sensors is flourishing fast in important junctions such as homes, hotels, hospitals, retail stores, manufacturing floors, railway stations, airports, oil wells, warehouses, etc. However, this extremely connected world, security implications for IoT are getting worse with constant rise malicious cyberattacks. The challenge how to secure sensors, services data....

10.1109/access.2022.3169141 article EN cc-by-nc-nd IEEE Access 2022-01-01

In this paper, we present approaches to generating random numbers, along with potential applications. Rather than trying provide extensive coverage of several techniques or algorithms that have appeared in the scientific literature, focus on some representative approaches, presenting their workings and properties detail. Our goal is delineate strengths weaknesses, as well application domains, so reader can judge what would be best approach for at hand, possibly a combination available...

10.3390/cryptography7040054 article EN cc-by Cryptography 2023-10-30

The whole security architecture of LTE/SAE (Long Term Evolution/System Architecture Evolution) is being consisted four main hardware-oriented cryptographic algorithms: KASUMI block ciphers, SNOW-3G stream cipher, the MILENAGE algorithm set, and 4G development ZUC algorithm. This paper presents an FPGA deployment a universal crypto processor for LTE, consisting both ciphers enabling each one on demand, which based two novel design principles. One more intelligent implementation algorithm's...

10.1109/tdsc.2016.2620437 article EN IEEE Transactions on Dependable and Secure Computing 2016-10-24

This work presents a new converged access architecture for LTE mobile backhaul networks. In the proposed architecture, evolved NodeBs (eNBs) are interconnected with local ring-based wavelength-division-multiplexed (WDM) passive optical networks (PONs), which aggregate and efficiently transport traffic to packet core (EPC). The WDM-PON ring design supports dynamic setup of virtual circuits inter-base-station communication, over dedicated λLAN channel. It also load balancing, by dynamically...

10.1364/jocn.6.000890 article EN Journal of Optical Communications and Networking 2014-09-22

Distributed Ledger Technologies (DLT) are based on the Blockchain concept and have been specifically designed for enterprise-level devices with acceptable computing powers network bandwidth. Direct Acyclic Graph (DAG) ledger(s) is a new form of DLT technology Internet-of- Things (IoT) due to nature its disadvantages limited IOTA DAG-based implementation IoT applications that has gained an increased attention in recent years. One major concerns hindering wide adaptation security concerns....

10.1109/iscc53001.2021.9631384 article EN 2022 IEEE Symposium on Computers and Communications (ISCC) 2021-09-05

The Blockchain concept is often mostly associated with Bitcoin and monetary transactions, however, the technology has enormous potential for several industries including space sector. Cybersecurity enhancement plays a detrimental role in critical core operations inside functional flow: from supply chain, satellite orbital tracking, digital communications efficacy. increasing adaption of connected highly advanced technologies exposes satellites, aeronautical drones, vehicles, ground stations...

10.1109/wisee49342.2022.9926843 article EN 2022-10-12

A contemporary technique for calculating seismic risk is earthquake nowcasting (EN), which analyzes the progression of (EQ) cycle in fault systems. 'Natural time' a novel idea time that serves as foundation EN assessment. The potential score (EPS), has been discovered to have useful uses regionally and worldwide, unique tool predict risk. For estimation EPS occurrences with highest magnitude among these applications, we since 2021 concentrated on Greece territory, applying...

10.20944/preprints202405.0972.v1 preprint EN 2024-05-14

A contemporary technique for calculating seismic risk is earthquake nowcasting (EN), which analyzes the progression of (EQ) cycle in fault systems. 'Natural time' a novel idea time that serves as foundation EN assessment. The potential score (EPS), has been discovered to have useful uses regionally and worldwide, unique tool predict risk. For estimation EPS occurrences with highest magnitude among these applications, we since 2021 concentrated on Greece territory, applying sophisticated...

10.20944/preprints202405.0972.v2 preprint EN 2024-08-16

this paper we present approaches for generating random numbers along with potential applications. Rather than trying to provide extensive coverage of several techniques or algorithms that have appeared in the scientific literature, focus on some representative presenting their workings and properties detail. Our goal is delineate strengths weaknesses as well application domains so reader can judge what would be best approach
 hand, possibly a combination available approaches. For...

10.20944/preprints202309.0879.v1 preprint EN 2023-09-14

In this paper the problem of IP watermark proof is attacked by a new technique applied at state machine level along with assisting hardware. Experiments on benchmark circuits and an example system-on-chip (SoC) indicate that overhead proposed delay area negligible extremely small respectively.

10.1109/dtis.2014.6850644 article EN 2014-05-01

The recent emergence of ultra-high-speed and high-definition data video services has pushed wireless network capacity to its limits. Cellular is therefore a valuable resource, whereas indoor coverage poses itself as challenging issue. At the same time, real-world paradigms multimedia transmission require effective Quality-of-Service (QoS) provisioning well power admission. To confront issues like delay-sensitive QoS requirements traffic provisioning, meet mobile customer needs, this paper...

10.4018/ijwnbt.2016010102 article EN International Journal of Wireless Networks and Broadband Technologies 2016-01-01

Orthogonal frequency-division multiple-access (OFDMA) small-cell networks of next-generation Long-Term Evolution (LTE-Advanced) standard, is perhaps a key factor to efficiently provide beneficial usage expensive radio resources, while maintaining adequate network capacity. Network capacity without doubt critical resource for LTE networks. At the same time, real-time multimedia transmission requires effective quality-of-service (QoS) provisioning, as well power admission. This paper proposes...

10.1109/cit/iucc/dasc/picom.2015.106 article EN 2015-10-01

Sixth generation (6G)-enabled massive network MANO orchestration, alongside distributed supervision and fully reconfigurable control logic that manages dynamic arrangement of components, such as cell-free, Open-Air Interface (OAI) RIS, is a potent enabler for the upcoming pervasive digitalization vertical use cases. In disruptive domain, artificial intelligence (AI)-driven zero-touch "Network Networks" intent-based automation shall be able to guarantee high degree security, efficiency,...

10.1109/gcwkshps58843.2023.10465223 article EN 2022 IEEE Globecom Workshops (GC Wkshps) 2023-12-04

It is widely accepted that GMPLS (Generalized MPLS) will be a key technology in the evolution of next generation reliable Internet Protocol (IP) backbone networks. Conventional GMPLS-based optical-switching network fault recovery only provides resiliency terms path segment selection instead constraint-based calculation. This can create severe impact on protocol's transport plane when occurs to link or with many optical connections attached it. paper proposes implementation an improved...

10.5220/0003433900450050 article EN cc-by-nc-nd 2011-01-01

The challenges of transferring cybersecurity technologies are varied and span a wide range from detailed technical issues to market, sales, production issues.It often seems that there is an art successfully crossing the great divide.Are cybersecurity-specific make technology transfer more difficult?

10.1109/msp.2013.42 article EN IEEE Security & Privacy 2013-03-01
Coming Soon ...