5 results on '"Komnios, Ioannis"'
Search Results
2. Optical PUFs as physical root of trust for blockchain‐driven applications.
- Author
-
Chaintoutis, Charidimos, Akriotou, Marialena, Mesaritakis, Charis, Komnios, Ioannis, Karamitros, Dimitris, Fragkos, Alexandros, and Syvridis, Dimitris
- Abstract
In an environment where cyber attacks are increasing, both in frequency and complexity, novel ways to shield data, users, and procedures have to be envisioned. Physical unclonable functions (PUFs) are the physical equivalent of one‐way mathematical transformations with the exception that their inherent physical complexity renders them resilient to cloning. One interesting deployment scenario includes PUFs as random key generators. The deterministic nature of their operation alleviates the necessity to store the keys in non‐volatile means. Along the same lines, blockchain is inherently resistant to modification of the data once stored while their overall security depends on the quality and secrecy of users' keys. Here, the authors propose a novel optical PUF implementation that can be combined with private blockchain modalities in order to cyber‐harden Internet of things ecosystems. PUF‐related experimental results are presented, alongside implementation scenarios. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
3. Optical PUFs as physical root of trust for blockchain-driven applications.
- Author
-
Chaintoutis, Charidimos, Akriotou, Marialena, Mesaritakis, Charis, Komnios, Ioannis, Karamitros, Dimitris, Fragkos, Alexandros, and Syvridis, Dimitris
- Subjects
- *
MATHEMATICAL transformations , *CYBERTERRORISM , *INTERNET of things , *TRUST , *CYBER physical systems - Abstract
In an environment where cyber attacks are increasing, both in frequency and complexity, novel ways to shield data, users, and procedures have to be envisioned. Physical unclonable functions (PUFs) are the physical equivalent of one-way mathematical transformations with the exception that their inherent physical complexity renders them resilient to cloning. One interesting deployment scenario includes PUFs as random key generators. The deterministic nature of their operation alleviates the necessity to store the keys in non-volatile means. Along the same lines, blockchain is inherently resistant to modification of the data once stored while their overall security depends on the quality and secrecy of users' keys. Here, the authors propose a novel optical PUF implementation that can be combined with private blockchain modalities in order to cyber-harden Internet of things ecosystems. PUF-related experimental results are presented, alongside implementation scenarios. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
4. Alternative Networks: Toward Global Access to the Internet for All.
- Author
-
Saldana, Jose, Arcia-Moret, Andres, Sathiaseelan, Arjuna, Braem, Bart, Pietrosemoli, Ermanno, Zennaro, Marco, Simo-Reigadas, Javier, Komnios, Ioannis, and Rey-Moreno, Carlos
- Subjects
- *
INTERNET , *DIGITAL divide , *MOBILE communication systems , *WIRELESS Internet , *IEEE 802.16 (Standard) , *TELECOMMUNICATION spectrum - Abstract
It is often said that the Internet is ubiquitous in our daily lives, but this holds true only for those who can easily access it. In fact, billions of people are still digitally disconnected, as bringing connectivity to certain zones does not make a good business case. The only solution for these unsatisfied potential users is to directly undertake the building of the infrastructure required to obtaining access to the Internet, typically forming groups in order to share the corresponding cost. This article presents a global classification and a summary of the main characteristics of different Alternative Network deployments that have arisen in recent years with an aim to provide Internet services in places where mainstream network deployments do not exist or are not adequate solutions. The "Global Access to the Internet for All" Research Group of the Internet Research Task Force, where all authors actively participate, is interested in documenting these emerging deployments. As an outcome of this work, a classification has converged by consensus, where five criteria have been identified and, based on them, four different types of Alternative Networks have been identified and described with real-world examples. Such a classification is useful for a deeper understanding of the common characteristics behind existing and emerging Alternative Networks. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
5. Comprehensive user requirements engineering methodology for secure and interoperable health data exchange.
- Author
-
Natsiavas, Pantelis, Rasmussen, Janne, Voss-Knude, Maja, Votis, Κostas, Coppolino, Luigi, Campegiani, Paolo, Cano, Isaac, Marí, David, Faiella, Giuliana, Clemente, Fabrizio, Nalin, Marco, Grivas, Evangelos, Stan, Oana, Gelenbe, Erol, Dumortier, Jos, Petersen, Jan, Tzovaras, Dimitrios, Romano, Luigi, Komnios, Ioannis, and Koutkias, Vassilis
- Subjects
- *
MEDICAL care , *COMPUTER crimes , *HEALTH information technology , *INTERNET security , *INTERNETWORKING , *COMPARATIVE studies , *RESEARCH methodology , *MEDICAL cooperation , *MEDICAL informatics , *RESEARCH , *SYSTEM analysis , *EVALUATION research , *DATA security , *ACQUISITION of data - Abstract
Background: Increased digitalization of healthcare comes along with the cost of cybercrime proliferation. This results to patients' and healthcare providers' skepticism to adopt Health Information Technologies (HIT). In Europe, this shortcoming hampers efficient cross-border health data exchange, which requires a holistic, secure and interoperable framework. This study aimed to provide the foundations for designing a secure and interoperable toolkit for cross-border health data exchange within the European Union (EU), conducted in the scope of the KONFIDO project. Particularly, we present our user requirements engineering methodology and the obtained results, driving the technical design of the KONFIDO toolkit.Methods: Our methodology relied on four pillars: (a) a gap analysis study, reviewing a range of relevant projects/initiatives, technologies as well as cybersecurity strategies for HIT interoperability and cybersecurity; (b) the definition of user scenarios with major focus on cross-border health data exchange in the three pilot countries of the project; (c) a user requirements elicitation phase containing a threat analysis of the business processes entailed in the user scenarios, and (d) surveying and discussing with key stakeholders, aiming to validate the obtained outcomes and identify barriers and facilitators for HIT adoption linked with cybersecurity and interoperability.Results: According to the gap analysis outcomes, full adherence with information security standards is currently not universally met. Sustainability plans shall be defined for adapting existing/evolving frameworks to the state-of-the-art. Overall, lack of integration in a holistic security approach was clearly identified. For each user scenario, we concluded with a comprehensive workflow, highlighting challenges and open issues for their application in our pilot sites. The threat analysis resulted in a set of 30 user goals in total, documented in detail. Finally, indicative barriers of HIT acceptance include lack of awareness regarding HIT risks and legislations, lack of a security-oriented culture and management commitment, as well as usability constraints, while important facilitators concern the adoption of standards and current efforts for a common EU legislation framework.Conclusions: Our study provides important insights to address secure and interoperable health data exchange, while our methodological framework constitutes a paradigm for investigating diverse cybersecurity-related risks in the health sector. [ABSTRACT FROM AUTHOR]- Published
- 2018
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.