Papers by Anastasios Fragopoulos
Abstract Data Machine
Proceedings of the WESS'15: Workshop on Embedded Systems Security - WESS'15, 2015
Heterogeneous networking in the home environment
The management and control at multiple protocol layers of a heterogeneous networking structure, t... more The management and control at multiple protocol layers of a heterogeneous networking structure, to support multimedia applications in the home environment, is considered. The paper examines possible scenarios, and corresponding architectural solutions, also in the light of existing wireless and sensor networks technologies.
Security Issues in Design of Embedded Systems

Content management and protection in Smart Cities IP - Based backbone Wireless Sensors Networks
IEEE International Symposium on Signal Processing and Information Technology, 2013
ABSTRACT Nowadays in modern and ubiquitous computing environments, it is imperative more than eve... more ABSTRACT Nowadays in modern and ubiquitous computing environments, it is imperative more than ever, the necessity for deployment of Wireless Sensor Networks, which can be used as backbone networks in order to convey different types of digital contents that are locally generated by public utility application servers. Such environments must be developed satisfying the basic security requirements for real-time, secure data communication, and protection of data and measurements, data integrity and confidentiality. In this work, we argue that the MPEG-21 Intellectual Property Management and Protection components can be used in order to achieve protection of transmitted information, since there is selective and controlled access to data that sent towards the central servers.

Imposing holistic privacy and data security on person centric ehealth monitoring infrastructures
The 12th IEEE International Conference on e-Health Networking, Applications and Services, 2010
Telemetric monitoring of vital parameters of patients with chronic diseases is recognized to impr... more Telemetric monitoring of vital parameters of patients with chronic diseases is recognized to improve their medical condition and hence their quality of life. It also improves treatment adjustments, reaction time in acute cases and helps to reduce duration and costs of hospitalization. As a result of this, there are plenty of products and solutions for personal health monitoring available today that acquire physiological data in real-time. In order for such systems to be widely acceptable and utilized by the medical community and the patients, they must be developed satisfying the security requirements imposed by real-time data communication and protection of sensitive physiological data and measurements, data integrity and confidentiality, and protection of the monitored patient's privacy. The work presented in this paper intends to fill the security gap, which makes these devices and the data acquired by them, vulnerable to any kind of attacks. By utilizing MPEG-21 standard's primitives, we show that protection of transmitted medical information and enhancement of patient's privacy is accomplished, since there is selective and controlled access to medical data that sent toward the hospital's servers.
Design Issues in Secure Embedded Systems
Industrial Information Technology, 2009

International Journal of Telemedicine and Applications, 2009
Nowadays in modern and ubiquitous computing environments, it is imperative more than ever the nec... more Nowadays in modern and ubiquitous computing environments, it is imperative more than ever the necessity for deployment of pervasive healthcare architectures into which the patient is the central point surrounded by different types of embedded and small computing devices, which measure sensitive physical indications, interacting with hospitals databases, allowing thus urgent medical response in occurrences of critical situations. Such environments must be developed satisfying the basic security requirements for real-time secure data communication, and protection of sensitive medical data and measurements, data integrity and confidentiality, and protection of the monitored patient's privacy. In this work, we argue that the MPEG-21 Intellectual Property Management and Protection (IPMP) components can be used in order to achieve protection of transmitted medical information and enhance patient's privacy, since there is selective and controlled access to medical data that sent toward the hospital's servers.
Adaptive DRM framework in user-converged multimedia ecosystems, utilizing MPEG-21 semantics
2009 International Symposium on Autonomous Decentralized Systems, 2009
As dynamicity in networks and interoperability in DRM systems become the critical aspects in netw... more As dynamicity in networks and interoperability in DRM systems become the critical aspects in networked ecosystems, new emerging frameworks for secure, user-converged digital content delivery are required. In this work, we argue that the IPMP and REL components of MPEG-21 framework should be utilized in order to achieve a user-adaptive and interoperable DRM architecture.
Cutting Edge Research in New Technologies, 2012

SOURCES OF RANDOMNESS FOR USE IN RANDOM NUMBER GENERATION
ABSTRACT Efficient generation of random numbers plays significant role in cryptographic applicati... more ABSTRACT Efficient generation of random numbers plays significant role in cryptographic applications. Such a generator has to produce unpredictable and un-correlated random bits. Random number generators are classified as pseudo-random number generators (PRNGs) and true random number generators (TRNGs). The first ones have the disadvantage that they can be proven predictable, while the latter ones can produce true random bits but it is not easy to re-produce specific sequences or implement them in constrained environments and there may exist correlations and biases of produced sequences. A third class of random number generators has been introduced, called hybrid-random number generators (h-RNGs), where there is a combination of a cryptographically strong PRNGs or TRNGs which are seeded, and possibly re-seeded, through a source of randomness with high entropy. In this paper, we present an overview of various sources of randomness that can be used either as direct random number generators or as seed sources in h-RNGs, for application in embedded systems.

Intellectual Property Protection Using Embedded Systems
ABSTRACT Development of innovative mechanisms for protection of Intellectual Property (IP) is a n... more ABSTRACT Development of innovative mechanisms for protection of Intellectual Property (IP) is a necessary and important activity in modern computing systems. Many parties participate in creation and distribution of protected property, such as creators, distributors, manufacturers, vendors, providers and the end-users. There have been various mechanisms for IP protection deployed already, but we need to reconsider some of them or deploy new ones, taking in advantage new trends and technologies. Embedded systems can be used as means to protect IP and implement DRM mechanisms into larger general purpose systems or into mobile consumer devices, like PDAs, mobile phones and mobile players, which are quite constrained environments. In this paper, we investigate and summarize existing methods to protect IP with the use of embedded systems.
Communication security and privacy in pervasive user-centric e-health systems using Digital Rights Management and side channel attacks defense mechanisms
In this work, communication security and privacy in pervasive user-centric e-health systems is st... more In this work, communication security and privacy in pervasive user-centric e-health systems is studied. Our proposed security scheme is presented which uses a combination of mechanisms from Digital Rights Management and side channel attacks defense in order to ensure privacy and security for patients' data. In particular, communication between medical, limited-resource, embedded devices, carried by the patients, and devices in central health installations is both encrypted by means of elliptic curve cryptography and protected against traffic analysis. In addition, a DRM scheme is used in order to ensure authorized-only access to sensitive health data.

The Visual Computer, 2008
In this paper, we introduce a European research project, interactive media with personal networke... more In this paper, we introduce a European research project, interactive media with personal networked devices (INTERMEDIA) in which we seek to progress beyond the home and device-centric convergence toward truly usercentric convergence of multimedia. Our vision is to make the user the multimedia center: the user as the point at which multimedia services and the means for interacting with them converge. This paper proposes the main research goals in providing users with a personalized interface and content independent of physical networked devices, and space and time. As a case study, we describe an indoors, mobile mixed reality guide system: Chloe@University. With a see-through head-mounted display (HMD) connected to a small wearable computing device, Chloe@University provides users with an efficient way to guide someone in a building. A 3D virtual character in front of the user guides him/her to the required destination.
The InterMedia networking and security architecture for user centric multimedia convergence
The InterMedia project aims at progressing towards user-centric convergence of multimedia, by put... more The InterMedia project aims at progressing towards user-centric convergence of multimedia, by putting the user at the center of services (multimedia applications), devices and interfaces for the interaction. One of the main implications of the user-centric approach is the seamless and secure access to content, regardless of the users' location and terminal device(s), which requires suitable solutions to manage mobility,
As networks become more and more complicated and applications more and more demanding, a very com... more As networks become more and more complicated and applications more and more demanding, a very common network topology for state-of-the-art multimedia applications supporting emerging user -centric frameworks is a heterogeneous wired/wireless architecture. A network architecture solution for Indoor/Outdoor heterogeneous networking applications, to support both multimedia and sensor applications suitable for such frameworks is proposed in this paper. Furthermore, an integrated DRM system architecture is proposed for the protection of Intellectual Property, characterized by its interoperability aspect.
Uploads
Papers by Anastasios Fragopoulos