Papers by Dimitrios Kallergis
25th Pan-Hellenic Conference on Informatics
2017 IEEE Global Engineering Education Conference (EDUCON)
Within the Internet of Things (IoT) ecosystem, an intelligent transportation service may incorpor... more Within the Internet of Things (IoT) ecosystem, an intelligent transportation service may incorporate data sharing with third-party services to enhance fast and accurate decision-making. In essence, this IoT-based transportation service may dynamically adapt an extra-domain one and adjusts several service lifecycle and key-processes, such as the fleet management. The depth of this adaptation can be highlighted by possible changes of the service’s security. However, the literature seems to lack an IoT-based service security assessment which also considers such IoT features. In this work, we rely on the stochastic modeling method to depict the data flow changes in regard to the fleet management using the Petri net ontology. The fleet management process is evaluated in two customised real-life scenarios to highlight how third-party data flow changes can affect this process lifecycle. Then, we assess the security for the two scenarios to estimate the degree in which the service is affect...
25th Pan-Hellenic Conference on Informatics
25th Pan-Hellenic Conference on Informatics
2017 IEEE Global Engineering Education Conference (EDUCON)
2017 IEEE Global Engineering Education Conference (EDUCON)
Within the Internet of Things (IoT) ecosystem, an intelligent transportation service may incorpor... more Within the Internet of Things (IoT) ecosystem, an intelligent transportation service may incorporate data sharing with third-party services to enhance fast and accurate decision-making. In essence, this IoT-based transportation service may dynamically adapt an extra-domain one and adjusts several service lifecycle and key-processes, such as the fleet management. The depth of this adaptation can be highlighted by possible changes of the service’s security. However, the literature seems to lack an IoT-based service security assessment which also considers such IoT features. In this work, we rely on the stochastic modeling method to depict the data flow changes in regard to the fleet management using the Petri net ontology. The fleet management process is evaluated in two customised real-life scenarios to highlight how third-party data flow changes can affect this process lifecycle. Then, we assess the security for the two scenarios to estimate the degree in which the service is affect...
IEEE Access, 2020
Communication networks for healthcare environments support various application types and should b... more Communication networks for healthcare environments support various application types and should be capable of providing them with the required Quality of Service (QoS) in terms of reliable data delivery, considerable data rate and low latency. The introduction of Tactile Internet (TI) healthcare applications is expected to upgrade the level of provided services to patients. The requirements of these applications are very stringent and a major requirement is that the existing network infrastructure must support them. Passive Optical Networks (PONs) have been proposed as an ideal candidate to support such demanding environments. One of the major challenges of such networks, which significantly affects the provided QoS, is the effective resource allocation in both the time and the wavelength domains. The existing resource allocation algorithms for PONs were designed without considering the stringent requirements of TI applications thus making PON support for TI inefficient. In this paper, a new double per priority queue dynamic wavelength and bandwidth allocation algorithm is presented. This algorithm allocates the network resources efficiently and fairly using several techniques, in order to meet the QoS demands of Tactile and other types of healthcare applications. Extensive simulation results indicate the effectiveness of the proposed algorithm to provide the required QoS for medical applications under various simulation scenarios whereas other well-known schemes are shown to lack such support. INDEX TERMS Healthcare applications, passive optical networks, quality of service, tactile Internet.
Ad Hoc Networks, 2018
Abstract Breakthrough recent advancements in the field of machine-to-machine (M2M) communications... more Abstract Breakthrough recent advancements in the field of machine-to-machine (M2M) communications impose the necessity to improve the service delivery by enforcing appropriate security rules. Due to the large number of the connected devices, the criticality of the M2M applications (e.g. patient monitoring and operation of critical infrastructures), and the network stability weaknesses, we need to consider and analyse the security aspects and establish a flexible policy-aware Service Oriented Architecture (SOA) competent to deal with these emerging challenges. This paper presents the existing reference models and proposes a novel Secure M2M Architecture (SeMMA) based on ETSI's M2M communication functional architecture enhanced with policy-based management capabilities and SOA capabilities. We explore the policy-based management aspects to improve the security of the M2M components and services and to mitigate the security concerns that arise by evaluating different scenarios. It is shown that incorporating an adaptive policy enforcement of the suitable security controls enables enhanced security capabilities, increased agility, and better service levels in the field of M2M communications.
2016 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), 2016
Within the Internet of Things (IoT) ecosystem, there is a need to interconnect networks of sensor... more Within the Internet of Things (IoT) ecosystem, there is a need to interconnect networks of sensors and smart objects in a way that they can intelligently interact with humans. In most cases, these networks have been implemented following the machine-to-machine (M2M) communication disciplines. To adequately design such an emerging system which also has legacy technology characteristics, it is crucial to adopt an architecture reference model. In the context of this work, an architecture and characteristics assessment is conducted to form a roadmap of evolution from an M2M solution to an IoT in the field of Autonomous Vehicles (AVs). Then, an architecture for an AV prototype within the IoT ecosystem is proposed; the intelligent Bus on Campus (iBuC). The respective services are illustrated through a customised real-life scenario.
2016 23rd International Conference on Telecommunications (ICT), 2016
The concept of security performance emerges as the core attribute when cloud-based systems need t... more The concept of security performance emerges as the core attribute when cloud-based systems need to process data flows through different countries. To effectively address the cloud security issues through a territorial perspective, it is crucial to focus on the initial objectives of the Terms of Service as issued by the cloud service operator or provider. In this paper, a cloud-based service scenario where sensitive data are transferred and managed in a cross-border manner is assessed. The threats definition process considers the adoption of mobile devices. The paper focuses on the security assessment process and on information reconnaissance which in turn leads to the cloud defence boundary's exploitation. Also, the issue of how the service level objectives (SLOs) may affect security and privacy issues in a cloud-based environment is addressed.
Our entire society is becoming more and more dependent on technology and specifically on software... more Our entire society is becoming more and more dependent on technology and specifically on software. The integration of e-learning software systems into our day by day life especially in e-learning applications generates modifications upon the society and, at the same time, the society itself changes the process of software development. This circle of continuous determination engenders a highly dynamic environment. Lehman in [6] describes the software development environment as being characterized by "a high, necessary and inevitable pressure for change". Changes are reflected in specific uncertainties which impact the success and performance of the software project development.
2013 12th International Conference on Information Technology Based Higher Education and Training (ITHET), 2013
ABSTRACT In this paper we overview the existing technologies and services that could be used to o... more ABSTRACT In this paper we overview the existing technologies and services that could be used to offer an infrastructure of a specific distributed file system for e-learning platforms. We provide an analysis of the design considerations that are relevant for such services. Moreover, in the following report we provide a description of the environment that will be used to evaluate alternative designs. Finally, we propose a solution that can provide most of the required services.
2010 14th Panhellenic Conference on Informatics, 2010
ArXiv, 2014
Social networks and their applications have become extremely popular during the last years, mostl... more Social networks and their applications have become extremely popular during the last years, mostly targeting users via the web. However, it has been recently observed an interest to offer social network services to mobile users. Telecom operators attempt to integrate existing social networks to their systems or develop new ones, in order to offer new services to their subscribers. Subsequently, emphasis is given to the user-context modeling, as well as to the integration of sources that leads to the summarized collection of information anchored to the user; such as its location or its mobile device type, etc. In this paper we discuss the most important factors and challenges encountered during the design of such a system on architectural, technological and tool level.
Studies in health technology and informatics, 2019
Recent statistics have demonstrated that Emergency Departments (EDs) in Greece lack in organizati... more Recent statistics have demonstrated that Emergency Departments (EDs) in Greece lack in organization and service. In most cases, patient prioritization is not automatically implemented. The main objective of this paper is to present IntelTriage, a smart triage system, that dynamically assigns priorities to patients in an ED and monitors their vital signs and location during their stay in the clinic through wearable biosensors. Initital scenarios and functional requirements are presented as preliminary results.
2017 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), 2017
The intelligent transportation services are part of the urban planning and smart <everything&g... more The intelligent transportation services are part of the urban planning and smart <everything> concept which aims to improve the user experience and to deliver new ways with increased added value. To prototype these services or to enhance the legacy transportation services with the evolving technology, it is likely to create significant overheads during various phases of the service lifecycle, such as during the design phase. To effectively tackle the challenges that appear in such an endeavour, the selection of the optimal modelling method and of the appropriate language plays a crucial role in creating and enabling innovative and efficient transportation service operations. In this paper, the utilization of a business-oriented modelling approach is proposed for the modelling of the Decision Support System (DSS) that supports these services. Two scenarios are assessed considering the DSS behaviour of an IoT-based intelligent transportation service. Finally, this paper provides...
The security evaluation for Mail Distribution Systems focuses on certification and reliability of... more The security evaluation for Mail Distribution Systems focuses on certification and reliability of sensitive data between mail servers. The need to certify the information conveyed is a result of known weaknesses in the simple mail transfer protocol (SMTP). The most important consequence of these weaknesses is the possibility to mislead the recipient, which is achieved via spam (especially email spoofing). Email spoofing refers to alterations in the headers and/or the content of the message. Therefore, the authenticity of the message is compromised. Unfortunately, the broken link between certification and reliability of the information is unsolicited email (spam). Unlike the current practice of estimating the cost of spam, which prompts organizations to purchase and maintain appropriate anti-spam software, our approach offers an alternative perspective of the economic and moral consequences of unsolicited mail. The financial data provided in this paper show that spam is a major contr...
Uploads
Papers by Dimitrios Kallergis
there is a need to interconnect networks of sensors and smart
objects in a way that they can intelligently interact with humans.
In most cases, these networks have been implemented following
the machine-to-machine (M2M) communication disciplines. To
adequately design such an emerging system which also has legacy
technology characteristics, it is crucial to adopt an architecture
reference model. In the context of this work, an architecture and
characteristics assessment is conducted to form a roadmap of
evolution from an M2M solution to an IoT in the field of
Autonomous Vehicles (AVs). Then, an architecture for an AV
prototype within the IoT ecosystem is proposed; the intelligent
Bus on Campus (iBuC). The respective services are illustrated
through a customised real-life scenario.