Match!
Charalampos Manifavas
Rochester Institute of Technology - Dubai
Distributed computingEmbedded systemComputer networkComputer securityComputer science
50Publications
14H-index
808Citations
What is this?
Publications 47
Newest
#1Ioannis Karamitsos (Rochester Institute of Technology - Dubai)
#2Charalampos Manifavas (Rochester Institute of Technology - Dubai)H-Index: 14
Last. Muhieddin Amer (Rochester Institute of Technology - Dubai)H-Index: 1
view all 3 authors...
The combination of Big Data and Internet of Things (IoT) is a research area that presents interesting challenges for the future of smart cities. These new challenges are related to the integration of business and technical streams into the smart city ecosystem. This chapter presents an overview of the Big Data and IoT technologies, highlighting how they interact while converging. Several smart cities applications are analyzed within the context of the IoT and Big Data. Moreover, a future integra...
Source
#1George Hatzivasilis (TUC: Technical University of Crete)H-Index: 8
#2Konstantinos Fysarakis (TUC: Technical University of Crete)H-Index: 10
Last. Charalampos Manifavas (Rochester Institute of Technology - Dubai)H-Index: 14
view all 4 authors...
Embedded systems are deployed in various domains, including industrial installations, critical and nomadic environments, private spaces and public infrastructures. Their operation typically involves access, storage and communication of sensitive and/or critical information that requires protection, making the security of their resources and services an imperative design concern. The demand for applicable cryptographic components is therefore strong and growing. However, the limited resources of ...
33 CitationsSource
Last. Nikos PapadakisH-Index: 5
view all 5 authors...
2 CitationsSource
#2Konstantinos Fysarakis (TUC: Technical University of Crete)H-Index: 10
Last. Ioannis G. Askoxylakis (FORTH: Foundation for Research & Technology – Hellas)H-Index: 12
view all 4 authors...
Ubiquitous devices comprising several resource-constrained nodes with sensors, actuators, and networking capabilities are becoming part of many solutions that seek to enhance user's environment smartness and quality of living, prominently including enhanced healthcare services. In such an environment, security issues are of primary concern as a potential resource misuse can severely impact user's privacy or even become life threatening. Access to these resources should be appropriately controlle...
7 CitationsSource
#1Konstantinos Fysarakis (TUC: Technical University of Crete)H-Index: 10
#2Othonas Soultatos (TUC: Technical University of Crete)H-Index: 3
Last. Ioannis G. Askoxylakis (FORTH: Foundation for Research & Technology – Hellas)H-Index: 12
view all 5 authors...
Abstract Computing devices permeate working and living environments, affecting all aspects of modern everyday lives; a trend which is expected to intensify in the coming years. In the residential setting, the enhanced features and services provided by said computing devices constitute what is typically referred to as a “smart home”. However, the direct interaction smart devices often have with the physical world, along with the processing, storage and communication of data pertaining to users’ l...
5 CitationsSource
#1George Hatzivasilis (TUC: Technical University of Crete)H-Index: 8
#2Ioannis Papaefstathiou (TUC: Technical University of Crete)H-Index: 18
Last. Charalampos Manifavas (Rochester Institute of Technology - Dubai)H-Index: 14
view all 3 authors...
Wireless ad-hoc networks are becoming popular due to the emergence of the Internet of Things and cyber-physical systems (CPSs). Due to the open wireless medium, secure routing functionality becomes important. However, the current solutions focus on a constrain set of network vulnerabilities and do not provide protection against newer attacks. In this paper, we propose SCOTRES—a trust-based system for secure routing in ad-hoc networks which advances the intelligence of network entities by applyin...
23 CitationsSource
#1George Hatzivasilis (TUC: Technical University of Crete)H-Index: 8
#2Ioannis Papaefstathiou (TUC: Technical University of Crete)H-Index: 18
Last. Charalampos Manifavas (RIT: Rochester Institute of Technology)H-Index: 14
view all 3 authors...
Railways constitute a main mean of mass transportation. Public, private, and military settings are traversing long distances everyday. Railway controlling software must collect spatial information and effectively manage these systems. The need to manage the underlying embedded systems, brought forward by the wider adoption of pervasive computing, is vital in the context of safety- and security-critical applications. This work presents RailwaySPD, a management framework of embedded systems for ra...
5 CitationsSource
Dec 1, 2016 in GLOBECOM (Global Communications Conference)
#1Konstantinos Fysarakis (TUC: Technical University of Crete)H-Index: 10
#2Ioannis G. Askoxylakis (FORTH: Foundation for Research & Technology – Hellas)H-Index: 12
Last. Vasilios Katos (BU: Bournemouth University)H-Index: 12
view all 6 authors...
Computing devices already permeate working and living environments, while researchers and engineers aim to exploit the potential of pervasive systems in order to introduce new types of services and address inveterate and emerging problems. This process will lead us eventually to the era of urban computing and the Internet of Things (IoT). However, the long-promised improvements require overcoming some significant obstacles introduced by these technological advancements. One such obstacle is the ...
22 CitationsSource
#1George Hatzivasilis (TUC: Technical University of Crete)H-Index: 8
#2George Floros (UoC: University of Crete)H-Index: 1
Last. Charalampos Manifavas (Rochester Institute of Technology - Dubai)H-Index: 14
view all 4 authors...
Embedded systems are routinely deployed in critical infrastructures nowadays, therefore their security is increasingly important. This, combined with the pressing requirement of deploying massive numbers of low-cost and low-energy embedded devices, stimulates the evolution of lightweight cryptography and other green-computing security mechanisms. New crypto-primitives are being proposed that offer moderate security and produce compact implementations. In this article, we present a lightweight au...
10 CitationsSource
#1Charalampos Manifavas (Rochester Institute of Technology - Dubai)H-Index: 14
#2George Hatzivasilis (TUC: Technical University of Crete)H-Index: 8
Last. Yannis Papaefstathiou (TUC: Technical University of Crete)H-Index: 1
view all 4 authors...
Pervasive computing constitutes a growing trend, aiming to embed smart devices into everyday objects. The limited resources of these devices and the ever-present need for lower production costs, lead to the research and development of lightweight cryptographic mechanisms. Block ciphers, the main symmetric key cryptosystems, perform well in this field. Nevertheless, stream ciphers are also relevant in ubiquitous computing applications, as they can be used to secure the communication in applicatio...
27 CitationsSource
12345