Journals     Conferences     Book chapters     Technical reports

Journal articles

5. Karopoulos, G., Mori, P. and Martinelli, F. (2013), "Usage Control in SIP-based multimedia delivery", Computers & Security. Vol. 39, Part B(0), pp. 406 - 418. Elsevier.
Abstract: The Session Initiation Protocol (SIP) is an application layer signaling protocol for the creation, modification and termination of multimedia sessions and VoIP calls with one or more participants. While SIP operates in highly dynamic environments, in the current version its authorization support is based on traditional access control models. The main problem these models face is that they were designed many years ago, and under some circumstances they tend to be inadequate in modern highly dynamic environments. Usage Control (UCON), instead, is a model that supports the same operations as traditional access control models do, but it further enhances them with novel ones. In previous work, an architecture supporting continuous authorizations in SIP, based on the UCON model, was presented. In this article, an authorization support implementing the whole UCON model, including authorizations, obligations and conditions, has been integrated in a SIP system. Moreover, a testbed has been set up to experimentally evaluate the performance of the proposed security mechanism.
BibTeX:
@article{Karopoulos2013,
  author = {Georgios Karopoulos and Paolo Mori and Fabio Martinelli},
  title = {Usage Control in SIP-based multimedia delivery},
  journal = {Computers & Security},
  publisher = {Elsevier},
  year = {2013},
  volume = {39, Part B},
  number = {0},
  pages = {406 - 418},
  url = {http://www.sciencedirect.com/science/article/pii/S016740481300134X},
  doi = {10.1016/j.cose.2013.09.005}
}
4. Karopoulos, G., Kambourakis, G. and Gritzalis, S. (2011), "PrivaSIP: Ad-hoc identity privacy in SIP", Computer Standards & Interfaces. Vol. 33(3), pp. 301-314. Elsevier.
Abstract: In modern and future networks that belong to different providers, multimedia protocols will have to operate through multiple domains. In such an environment security is considered a crucial parameter; this is true especially for privacy since not all domains can be considered trusted beforehand in terms of personal data protection. Probably the most promising protocol for multimedia session management is SIP. While SIP is popular and a lot of research has been conducted, it still has some security issues, one of which is related to privacy and more particularly the protection of user identities (IDs). In the general case everybody can reveal the communicating parties IDs by simply eavesdropping on the exchanged SIP messages. In this paper we analyze the lack of user ID protection in SIP and propose two solutions; in the first the ID of the caller is protected while in the second both IDs of the caller and the callee are protected. Our work also includes performance results and extensive comparison with similar methods. The most significant advantage of our method is that it can assure user ID protection even when SIP messages are transmitted through untrusted SIP domains before reaching the Home Domain of the user or another trusted domain. Moreover, it does not require from the SIP Proxy server to maintain state information for exchanged SIP requests and respective responses.
BibTeX:
@article{Karopoulos2011,
  author = {Giorgos Karopoulos and
Georgios Kambourakis and
Stefanos Gritzalis}, title = {PrivaSIP: Ad-hoc identity privacy in SIP}, journal = {Computer Standards & Interfaces}, publisher = {Elsevier}, year = {2011}, volume = {33}, number = {3}, pages = {301--314}, url = {http://www.sciencedirect.com/science/article/pii/S0920548910000942}, doi = {10.1016/j.csi.2010.07.002} }
3. Terzis, I., Kambourakis, G., Karopoulos, G. and Lambrinoudakis, C. (2011), "Privacy preserving context transfer schemes for 4G networks", Wireless Communications and Mobile Computing. Vol. 11(2), pp. 289-302. John Wiley & Sons, Ltd.
Abstract: In the near future, wireless heterogeneous networks are expected to interconnect in an all-IP architecture. An open issue towards this direction is the uninterrupted continuation of the received services during handover between networks employing different access technologies. In this context, Mobile IP (MIP) is a protocol that allows fast and secure handovers. However, MIP per se cannot handle all the issues that surface during handovers in certain services, and more specifically, when the information of the current state of a service requires re-establishment on the new subnet without having to repeat the entire protocol exchange with the mobile host from the outset. A number of methods have been proposed to solve the aforementioned problem, commonly referred to as secure context transfer. However, while such methods do succeed in minimising the disruption caused by security-related delays, it seems that little has been done to protect the end-users' privacy as well. In this paper, a number of privacy enhanced (PE) context transfer schemes are presented. The first two of them have been introduced in a previous work of ours while the other two are novel. All schemes are analysed in terms of message exchange and evaluated through simulations. The performance of our schemes is compared with the standard ones proposed by the Seamoby work group (WG). The results demonstrate that the proposed schemes are very efficient in terms of application handover times, while at the same time guarantee the privacy of the end-user.
BibTeX:
@article{Terzis2011,
  author = {Terzis, Iosif and Kambourakis, Georgios and Karopoulos, Giorgos and Lambrinoudakis, Costas},
  title = {Privacy preserving context transfer schemes for 4G networks},
  journal = {Wireless Communications and Mobile Computing},
  publisher = {John Wiley & Sons, Ltd},
  year = {2011},
  volume = {11},
  number = {2},
  pages = {289--302},
  url = {http://onlinelibrary.wiley.com/doi/10.1002/wcm.1019/abstract},
  doi = {10.1002/wcm.1019}
}
2. Karopoulos, G., Kambourakis, G., Gritzalis, S. and Konstantinou, E. (2010), "A framework for identity privacy in SIP", Journal of Network and Computer Applications. Vol. 33(1), pp. 16 - 28. Elsevier.
Abstract: Secure multimedia delivery in modern and future networks is one of the most challenging problems towards the system integration of fourth generation (4G) networks. This integration means that different service and network providers will have to interoperate in order to offer their services to end users. This multidomain environment poses serious threats to the end user who has contract with, and trusts only a limited number of operators and service providers. One such threat is end users’ privacy on which we will focus in this paper. Probably the most promising protocol for multimedia session management is the Session Initiation Protocol (SIP), which is an application layer protocol and thus can operate on top of different lower layer technologies. SIP is quite popular and a lot of research has been conducted; however, it still has some security issues, one of which is related to privacy and more particularly the protection of user identities (IDs). In this paper we comment on the ID privacy issue of SIP and propose a framework called PrivaSIP that can protect either the caller's ID or both the caller's and the callee's IDs in multidomain environments. We present different implementations of our framework based on asymmetric and symmetric cryptography analyzing the pros and cons of each one of them. Furthermore, we provide performance measurements in order to estimate the performance penalty of our framework over standard SIP. The most significant advantage of our method is that it can assure user ID protection even when SIP messages are transmitted through untrusted SIP domains, while our results show that this can be achieved with no perceived delay by the end user.
BibTeX:
@article{Karopoulos2010,
  author = {Giorgos Karopoulos and Georgios Kambourakis and Stefanos Gritzalis and Elisavet Konstantinou},
  title = {A framework for identity privacy in SIP},
  journal = {Journal of Network and Computer Applications},
  publisher = {Elsevier},
  year = {2010},
  volume = {33},
  number = {1},
  pages = {16 - 28},
  url = {http://www.sciencedirect.com/science/article/pii/S1084804509001052},
  doi = {10.1016/j.jnca.2009.07.004}
}
1. Karopoulos, G., Kambourakis, G. and Gritzalis, S. (2007), "Survey of secure handoff optimization schemes for multimedia services over all-IP wireless heterogeneous networks", Communications Surveys & Tutorials., Third quarter, 2007. Vol. 9(3), pp. 18-28. IEEE.
Abstract: In the very near future, we shall witness the coexistence of networks with heterogeneous link layer technologies. Such networks will naturally overlap each other and mobile users will need to frequently handoff among them for a number of reasons, including the quest for higher speeds and/or lower cost. Handoffs between such hybrid networks should be fast enough to support demanding applications, like multimedia content delivery, but also secure enough since different network providers are involved. This gets even more complicated considering that network providers may not simultaneously be multimedia service providers as it is the case today. In order to support security operations in a large scale the employment of an AAA protocol is mandated; however, this adds more delay to the handoff process. This article analyses and compares the prominent methods proposed so far that optimize the secure handoff process in terms of delay and are suitable for uninterruptible secure multimedia service delivery.
BibTeX:
@article{Karopoulos2007a,
  author = {Karopoulos, G. and Kambourakis, G. and Gritzalis, S.},
  title = {Survey of secure handoff optimization schemes for multimedia services over all-IP wireless heterogeneous networks},
  journal = {Communications Surveys & Tutorials},
  publisher = {IEEE},
  year = {2007},
  volume = {9},
  number = {3},
  pages = {18-28},
  url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=4317619},
  doi = {10.1109/COMST.2007.4317619}
}
top

Conference papers

11. Chatzikonstantinou, A., Ntantogian, C., Karopoulos, G. and Xenakis, C. (2015), "An Empirical Evaluation of Cryptography Usage in Android Applications", In 9th EAI International Conference on Bio-inspired Information and Communications Technologies, December 3-5, 2015, New York, United States, (accepted)., December, 2015. ACM.
Abstract: Mobile application developers are using cryptography in their products to protect sensitive data like passwords, short messages, documents etc. In this paper, we study whether cryptography and related techniques are employed in a proper way, in order to protect these private data. To this end, we downloaded 49 Android applications from the Google Play marketplace and performed static and dynamic analysis in an attempt to detect possible cryptographic misuses. The results showed that 87.8% of the applications present some kind of misuse, while for the rest of them no cryptography usage was detected during the analysis. Finally, we suggest countermeasures, mainly intended for developers, to alleviate the issues identified by the analysis.
BibTeX:
@inproceedings{Chatzikon2015,
  author = {Alexia Chatzikonstantinou and Christoforos Ntantogian and Georgios Karopoulos and Christos Xenakis},
  title = {An Empirical Evaluation of Cryptography Usage in Android Applications},
  booktitle = {9th EAI International Conference on Bio-inspired Information and Communications Technologies, December 3-5, 2015, New York, United States, (accepted)},
  publisher = {ACM},
  year = {2015}
}
10. Ntantogian, C., Valtas, G., Kapetanakis, N., Lalagiannis, F., Karopoulos, G. and Xenakis, C. (2015), "Attacking GSM Networks as a Script Kiddie Using Commodity Hardware and Software", In 12th International Conference on Trust, Privacy & Security in Digital Business (TrustBus '15)., September, 2015. Springer.
Abstract: With the emergence of widely available hardware and software tools for GSM hacking, the security of cellular networks is threatened even by script kiddies. In this paper we present four different attacks in GSM networks, using commodity hardware as well as open source and freely available software tools. All attacks are performed using a common DVB-T TV tuner, which is used as a sniffer for the GSM radio interface, as well as an Arduino combined with a GSM shield that is used as a software programmable mobile phone. The attacks target both mobile users and the network, ranging from sniffing the signaling traffic to tracking and performing denial of service to the subscribers. Despite the script kiddie style of the attacks, their consequences are critical and threaten the normal operation of the cellular networks.
BibTeX:
@inproceedings{Ntantogian2015,
  author = {Ntantogian, Christoforos and Valtas, Grigoris and Kapetanakis, Nikos and Lalagiannis, Faidon and Karopoulos, Georgios and Xenakis, Christos},
  title = {Attacking GSM Networks as a Script Kiddie Using Commodity Hardware and Software},
  booktitle = {12th International Conference on Trust, Privacy & Security in Digital Business (TrustBus '15)},
  publisher = {Springer},
  year = {2015},
  url = {http://dx.doi.org/10.1007/978-3-319-22906-5_6},
  doi = {10.1007/978-3-319-22906-5_6}
}
9. Demertzis, F.F., Karopoulos, G., Xenakis, C. and Colarieti, A. (2015), "Self-organised Key Management for the Smart Grid", In Ad-hoc, Mobile, and Wireless Networks - 14th International Conference,
ADHOC-NOW 2015, Athens, Greece, June 29 - July 1, 2015, Proceedings., June, 2015. , pp. 303-316.
Abstract: As Smart Grid deployments emerge around the world, their protection against cyberattacks becomes more crucial. Before protective measures are put into place, one of the main factors to be considered is key management. Smart Grid poses special requirements compared to traditional networks; however, the review of previous work reveals that existing schemes are not complete. Here we propose a scalable and distributed key management scheme for the Smart Grid based on the Web-of-Trust concept. Our proposal is build on top of a Distributed Hash Table for efficient lookups of trust relationships. The target of this scheme is to create a key management system for the Smart Grid without the need of an always available Trusted Third Party. The underlying Distributed Hash Table can be further utilised as an infrastructure to build other Smart Grid services on top of it, like secure and/or anonymous aggregation, billing, etc.
BibTeX:
@inproceedings{Demertzis2015,
  author = {Foivos F. Demertzis and
Georgios Karopoulos and
Christos Xenakis and
Andrea Colarieti}, title = {Self-organised Key Management for the Smart Grid}, booktitle = {Ad-hoc, Mobile, and Wireless Networks - 14th International Conference,
ADHOC-NOW 2015, Athens, Greece, June 29 - July 1, 2015, Proceedings}, year = {2015}, pages = {303--316}, url = {http://dx.doi.org/10.1007/978-3-319-19662-6_21}, doi = {10.1007/978-3-319-19662-6_21} }
8. Karopoulos, G., Fakis, A. and Kambourakis, G. (2014), "Complete SIP Message Obfuscation: PrivaSIP over Tor", In 2014 Ninth International Conference on Availability, Reliability and Security (ARES)., September, 2014. , pp. 217-226.
Abstract: Anonymity on SIP signaling can be achieved either by the construction of a lower level tunnel (via the use of SSL or IPSec protocols) or by employing a custom-tailored solution. Unfortunately, the former category of solutions present significant impediments including the requirement for a PKI and the hop-by-hop fashioned protection, while the latter only concentrate on the application layer, thus neglecting sensitive information leaking from lower layers. To remediate this problem, in the context of this paper, we employ the well-known Tor anonymity system to achieve complete SIP traffic obfuscation from an attacker's standpoint. Specifically, we capitalize on Tor for preserving anonymity on network links that are considered mostly untrusted, i.e., those among SIP proxies and the one between the last proxy in the chain and the callee. We also, combine this Tor-powered solution with PrivaSIP to achieve an even greater level of protection. By employing PrivaSIP we assure that: (a) the first hop in the path (i.e., between the caller and the outbound proxy) affords anonymity, (b) the callee does not know the real identity of the caller, and (c) no real identities of both the caller and the callee are stored in log files. We also evaluate this scheme in terms of performance and show that even in the worst case, the latency introduced is not so high as it might be expected due to the use of Tor.
BibTeX:
@inproceedings{Karopoulos2014,
  author = {Karopoulos, Georgios and Fakis, Alexandros and Kambourakis, Georgios},
  title = {Complete SIP Message Obfuscation: PrivaSIP over Tor},
  booktitle = {2014 Ninth International Conference on Availability, Reliability and Security (ARES)},
  year = {2014},
  pages = {217-226},
  url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6980285},
  doi = {10.1109/ARES.2014.36}
}
7. Genge, B., Siaterlis, C. and Karopoulos, G. (2013), "Data fusion-base anomaly detection in networked critical infrastructures", In Dependable Systems and Networks Workshop (DSN-W), 2013 43rd Annual IEEE/IFIP Conference on., June, 2013. , pp. 1-8.
Abstract: The dramatic increase in the use of Information and Communication Technologies (ICT) within Networked Critical Infrastructures (NCIs), e.g., the power grid, has lead to more efficient and flexible installations as well as new services and features, e.g., remote monitoring and control. Nevertheless, this has not only exposed NCIs to typical ICT systems attacks, but also to a new breed of cyber-physical attacks. To alleviate these issues, in this paper we propose a novel approach for detecting cyber-physical anomalies in NCIs using the concept of Cyber-physical data fusion. By employing Dempster-Shafer's “Theory of Evidence” we combine knowledge from the cyber and physical dimension of NCIs in order to achieve an Anomaly Detection System (ADS) capable to detect even small disturbances that are not detected by traditional approaches. The proposed ADS is validated in a scenario assessing the consequences of Distributed Denial of Service (DDoS) attacks on Multi Protocol Label Switching (MPLS) Virtual Private Networks (VPNs) and the propagation of such disturbances to the operation of a simulated power grid.
BibTeX:
@inproceedings{Genge2013,
  author = {Genge, B. and Siaterlis, C. and Karopoulos, G.},
  title = {Data fusion-base anomaly detection in networked critical infrastructures},
  booktitle = {Dependable Systems and Networks Workshop (DSN-W), 2013 43rd Annual IEEE/IFIP Conference on},
  year = {2013},
  pages = {1--8},
  url = {http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6615505},
  doi = {10.1109/DSNW.2013.6615505}
}
6. Karopoulos, G., Mori, P. and Martinelli, F. (2012), "Continuous Authorizations in SIP with Usage Control", In Proceedings of the 2012 20th Euromicro International Conference on Parallel, Distributed and Network-based Processing. Washington, DC, USA, February, 2012. , pp. 283-287. IEEE Computer Society.
Abstract: The Session Initiation Protocol (SIP) is a signaling protocol for the creation, modification and termination of multimedia sessions with one or more participants. While SIP operates in highly dynamic environments such as Next Generation Networks, in current deployments its access control support is based on traditional access control models. The main problem these models face is that under certain circumstances they tend to be inadequate in current highly dynamic environments. Usage Control is an access control model that supports the same functionalities as traditional models do, but further introduce novel ones. In a previous work, an architecture supporting continuous authorization on SIP based on the Usage Control model was presented. Here this architecture is further elaborated, described in more detail and experimentally evaluated.
BibTeX:
@inproceedings{Karopoulos2012,
  author = {Karopoulos, Georgios and Mori, Paolo and Martinelli, Fabio},
  title = {Continuous Authorizations in SIP with Usage Control},
  booktitle = {Proceedings of the 2012 20th Euromicro International Conference on Parallel, Distributed and Network-based Processing},
  publisher = {IEEE Computer Society},
  year = {2012},
  pages = {283--287},
  url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6169561},
  doi = {10.1109/PDP.2012.81}
}
5. Karopoulos, G. and Martinelli, F. (2011), "IMS Session Management Based on Usage Control", In Secure and Trust Computing, Data Management and Applications., June, 2011. Vol. 186, pp. 71-78. Springer Berlin Heidelberg.
Abstract: Multimedia applications have made their way to the wireless/mobile world and this is not likely to change. However, people have not stopped using multimedia services through wired networks and this is also something that is not foreseen to change. What really is changing in the coming networks is the separation of network and service providers; this separation is creating new security challenges since the end user does not have the same trust relationships with all these providers. This paper proposes an architecture for protecting end users from untrusted and unreliable multimedia service providers in Next Generation Networks (NGNs) that utilize the IP Multimedia Subsystem (IMS) for multimedia delivery. Our proposal is based on the Usage Control (UCON) model for monitoring continuously the multimedia content delivered to the end user and ensure that it is the proper content requested by the user.
BibTeX:
@inproceedings{Karopoulos2011a,
  author = {Karopoulos, Giorgos and Martinelli, Fabio},
  editor = {Park, JamesJ. and Lopez, Javier and Yeo, Sang-Soo and Shon, Taeshik and Taniar, David},
  title = {IMS Session Management Based on Usage Control},
  booktitle = {Secure and Trust Computing, Data Management and Applications},
  publisher = {Springer Berlin Heidelberg},
  year = {2011},
  volume = {186},
  pages = {71-78},
  url = {http://link.springer.com/chapter/10.1007%2F978-3-642-22339-6_9},
  doi = {10.1007/978-3-642-22339-6_9}
}
4. Karopoulos, G., Kambourakis, G. and Gritzalis, S. (2008), "Caller identity privacy in SIP heterogeneous realms: A practical solution", In Computers and Communications, 2008. ISCC 2008. IEEE Symposium on., July, 2008. , pp. 37-43.
Abstract: The growing demand for voice services and multimedia delivery over the Internet has raised SIPpsilas popularity making it a subject of extensive research. SIP is an application layer control signaling protocol, whose main purpose is to create, modify and terminate multimedia sessions. Research has shown that SIP has a number of security issues that must be solved in order to increase its trustworthiness and supersede or coexist with PSTN. In this paper our purpose is to address such a weakness, namely the caller identity privacy issue. While some solutions to this problem do exist, we will show that they are inadequate in a number of situations. Furthermore, we will propose a novel scheme for the protection of caller identity which can also support roaming between different administrative domains. Finally, we provide some performance results, which demonstrate that the proposed solution is efficient even in low-end mobile devices.
BibTeX:
@inproceedings{Karopoulos2008a,
  author = {Karopoulos, G. and Kambourakis, G. and Gritzalis, S.},
  title = {Caller identity privacy in SIP heterogeneous realms: A practical solution},
  booktitle = {Computers and Communications, 2008. ISCC 2008. IEEE Symposium on},
  year = {2008},
  pages = {37-43},
  url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=4625770},
  doi = {10.1109/ISCC.2008.4625770}
}
3. Karopoulos, G., Kambourakis, G. and Gritzalis, S. (2008), "Privacy Protection in Context Transfer Protocol", In Proceedings of the 16th Euromicro Conference on Parallel, Distributed and Network-Based Processing (PDP 2008). Washington, DC, USA, February, 2008. , pp. 590-596. IEEE Computer Society.
Abstract: In the future 4G wireless networks will span across different administrative domains. In order to provide secure seamless handovers in such an environment the context transfer protocol is an attractive solution. However, the aforementioned protocol arises some privacy issues concerning the location and movement of users roaming between administrative domains. The purpose of this paper is to present and analyze these privacy issues and propose two privacy enhanced context transfer schemes that alleviate these problems. In the first scheme the Mobile Node (MN) is responsible for the transmission of the context to the new domain. In the second scheme the Home Domain (HD) of the user forwards the context acting as a proxy between the old and the new domain. While the second scheme is expected to be more useful towards realizing seamless handovers, the first one poses less signaling load to the HD. In addition, assuming that the most appropriate form of user identity for the context is the Network Access Identifier (NAI), we show how the employment of temporary NAIs can further increase the privacy of our schemes.
BibTeX:
@inproceedings{Karopoulos2008,
  author = {Karopoulos, Giorgos and Kambourakis, Georgios and Gritzalis, Stefanos},
  title = {Privacy Protection in Context Transfer Protocol},
  booktitle = {Proceedings of the 16th Euromicro Conference on Parallel, Distributed and Network-Based Processing (PDP 2008)},
  publisher = {IEEE Computer Society},
  year = {2008},
  pages = {590--596},
  url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=4457174},
  doi = {10.1109/PDP.2008.60}
}
2. Karopoulos, G., Kambourakis, G. and Gritzalis, S. (2007), "Two Privacy Enhanced Context Transfer Schemes", In Proceedings of the 3rd ACM Workshop on QoS and Security for Wireless and Mobile Networks. New York, NY, USA, October, 2007. , pp. 172-175. ACM.
Abstract: Foreseeable 4G environments will extensively take advantage of the concept of context transfer to provide seamless secure handovers between different administrative domains. However, the utilization of context transfer comes with a cost in the users' privacy. The purpose of this paper is to elaborate on these privacy issues and propose two privacy enhanced context transfer schemes that alleviate these problems. In the first scheme the Mobile Node (MN) is responsible for the transmission of the context to the new domain. In the second scheme the Home Domain (HD) of the user forwards the context acting as a proxy between the old and the new domain. In addition, assuming that the most appropriate form of user identity for the context is the Network Access Identifier (NAI), we show how the employment of temporary NAIs can further increase the privacy of our schemes.
BibTeX:
@inproceedings{Karopoulos2007,
  author = {Karopoulos, Giorgos and Kambourakis, Georgios and Gritzalis, Stefanos},
  title = {Two Privacy Enhanced Context Transfer Schemes},
  booktitle = {Proceedings of the 3rd ACM Workshop on QoS and Security for Wireless and Mobile Networks},
  publisher = {ACM},
  year = {2007},
  pages = {172--175},
  url = {http://dl.acm.org/citation.cfm?doid=1298239.1298272},
  doi = {10.1145/1298239.1298272}
}
1. Karopoulos, G., Kambourakis, G. and Gritzalis, S. (2007), "Privacy Preserving Context Transfer in all-IP Networks", In 4th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007., September, 2007. , pp. 390-395. Springer.
Abstract: In an all-IP environment, the concept of context transfer is used to provide seamless secure handovers between different administrative domains. However, the utilization of context transfer arises some privacy issues concerning the location and movement of users roaming between domains. In this paper we elaborate on these privacy issues and propose an alternative context transfer protocol that protects user’ location privacy as well. In addition, assuming that the context carries a user identity in the form of a Network Access Identifier (NAI), we show how the employment of temporary NAIs can further increase the privacy of our scheme.
BibTeX:
@inproceedings{Karopoulos2007b,
  author = {Karopoulos, Giorgos and Kambourakis, Georgios and Gritzalis, Stefanos},
  title = {Privacy Preserving Context Transfer in all-IP Networks},
  booktitle = {4th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007},
  publisher = {Springer},
  year = {2007},
  pages = {390--395},
  url = {http://link.springer.com/chapter/10.1007%2F978-3-540-73986-9_33},
  doi = {10.1007/978-3-540-73986-9_33}
}
top

Book chapters

1. Karopoulos, G., Ntantogian, C. and Xenakis, C. (2017), "Privacy-Preserving Aggregation in the Smart Grid" In Ferrag, Mohamed Amine and Ahmed Ahmim (Eds.), Security Solutions and Applied Cryptography in Smart Grid Communications., March, 2017. pp. 1-407. IGI Global.
BibTeX:
@inbook{Karopoulos2017,
  author = {Karopoulos, Georgios and Ntantogian, Christoforos and Xenakis, Christos},
  editor = {Ferrag, Mohamed Amine and Ahmed Ahmim},
  title = {Privacy-Preserving Aggregation in the Smart Grid},
  booktitle = {Security Solutions and Applied Cryptography in Smart Grid Communications},
  publisher = {IGI Global},
  year = {2017},
  pages = {1-407},
  doi = {10.4018/978-1-5225-1829-7}
}
top

Technical reports

9. Karopoulos, G. and Benoist, T. (2014), "Roadmap for the creation of a simplified Internet topology model", JRC Scientific and Policy Reports.
BibTeX:
@techreport{Karopoulos2014c,
  author = {Karopoulos, Georgios And Benoist, Thierry},
  title = {Roadmap for the creation of a simplified Internet topology model},
  type = {JRC Scientific and Policy Reports},
  year = {2014}
}
8. Karopoulos, G., Charonitakis, G., Theodoridis, G. and Benoist, T. (2014), "Literature review and expertise development on the available approaches and data sets for the creation of Internet topology models", JRC Scientific and Policy Reports. (JRC90880)
BibTeX:
@techreport{Karopoulos2014b,
  author = {Karopoulos, Georgios And Charonitakis, Georgios And Theodoridis, Georgios And Benoist, Thierry},
  title = {Literature review and expertise development on the available approaches and data sets for the creation of Internet topology models},
  type = {JRC Scientific and Policy Reports},
  year = {2014},
  number = {JRC90880}
}
7. Karopoulos, G., Theodoridis, G., Charonitakis, G. and Benoist, T. (2014), "Internet topology datasets: Collection and first assessment of Internet topology datasets", JRC Technical Systems. (JRC91943)
BibTeX:
@techreport{Karopoulos2014a,
  author = {Karopoulos, Georgios And Theodoridis, Georgios And Charonitakis, Georgios And Benoist, Thierry},
  title = {Internet topology datasets: Collection and first assessment of Internet topology datasets},
  type = {JRC Technical Systems},
  year = {2014},
  number = {JRC91943}
}
6. Karopoulos, G. and Siaterlis, C. (2013), "Studying the effects of power outages on the Internet topology", JRC Scientific and Policy Reports. (JRC84907)
BibTeX:
@techreport{Karopoulos2013b,
  author = {Karopoulos, Georgios And Siaterlis, Christos},
  title = {Studying the effects of power outages on the Internet topology},
  type = {JRC Scientific and Policy Reports},
  year = {2013},
  number = {JRC84907}
}
5. Karopoulos, G. and Siaterlis, C. (2013), "State of the art on the available data and measurement methodologies in order to collect information regarding Internet topology", JRC Scientific and Policy Reports. (JRC85153)
BibTeX:
@techreport{Karopoulos2013a,
  author = {Karopoulos, Georgios And Siaterlis, Christos},
  title = {State of the art on the available data and measurement methodologies in order to collect information regarding Internet topology},
  type = {JRC Scientific and Policy Reports},
  year = {2013},
  number = {JRC85153}
}
4. Siaterlis, C., Benoist, T., Karopoulos, G., Perez-Garcia, A. and Soupionis, I. (2013), "Alternative approaches for cyber-security exercises", JRC Scientific and Policy Reports. (JRC83613)
BibTeX:
@techreport{Siaterlis2013a,
  author = {Siaterlis, Christos And Benoist, Thierry And Karopoulos, Georgios And Perez-Garcia, Andres And Soupionis, Ioannis},
  title = {Alternative approaches for cyber-security exercises},
  type = {JRC Scientific and Policy Reports},
  year = {2013},
  number = {JRC83613}
}
3. Siaterlis, C., Karopoulos, G., Hohenadel, M., Benoist, T. and Giannopoulos, G. (2013), "First steps in the study of Critical Information Infrastructure topologies", JRC Scientific and Policy Reports. (JRC83424)
BibTeX:
@techreport{Siaterlis2013,
  author = {Siaterlis, Christos And Karopoulos, Georgios And Hohenadel, Marc And Benoist, Thierry And Giannopoulos, Georgios},
  title = {First steps in the study of Critical Information Infrastructure topologies},
  type = {JRC Scientific and Policy Reports},
  year = {2013},
  number = {JRC83424}
}
2. Karopoulos, G., Benoist, T., Siaterlis, C. and Perez-Garcia, A. (2012), "Using EXITO in Cyber Europe 2012", JRC Scientific and Policy Reports. (JRC78252)
BibTeX:
@techreport{Karopoulos2012a,
  author = {Karopoulos, Georgios And Benoist, Thierry And Siaterlis, Christos And Perez-Garcia, Andres},
  title = {Using EXITO in Cyber Europe 2012},
  type = {JRC Scientific and Policy Reports},
  year = {2012},
  number = {JRC78252}
}
1. Siaterlis, C., Benoist, T., Karopoulos, G. and Perez-Garcia, A. (2012), "Alternative approaches for cyber-security exercises", JRC Scientific and Policy Reports. (JRC78295)
BibTeX:
@techreport{Siaterlis2012,
  author = {Siaterlis, Christos And Benoist, Thierry And Karopoulos, Georgios And Perez-Garcia, Andres},
  title = {Alternative approaches for cyber-security exercises},
  type = {JRC Scientific and Policy Reports},
  year = {2012},
  number = {JRC78295}
}
top