Nikos Komninos
Dr. Komninos (ORCID: https://orcid.org/0000-0003-2776-1283) has over ten years of R&D experience in the academia and industry working on the evaluation, analysis and development of practical secure communication systems. He has been involved in several areas of information security and cryptography. Some of his work include design / analysis of authentication, key agreement, intrusion detection and response protocols/mechanisms in ad hoc and cellular networks, design / evaluation of efficient encryption algorithms, attack analysis of cryptographic protocols, transport / network layer security, smart cards, biometrics and e-health security.
Dr. Komninos has written over 80 peer-review journals and conference publications, patents and books in the information security and cryptography research area. He has been invited as international advisor and technical program committee, guest editor in international conferences and journals and speaker with honors in the field.
More info here: https://www.city.ac.uk/people/academics/nikos-komninos
Dr. Komninos has written over 80 peer-review journals and conference publications, patents and books in the information security and cryptography research area. He has been invited as international advisor and technical program committee, guest editor in international conferences and journals and speaker with honors in the field.
More info here: https://www.city.ac.uk/people/academics/nikos-komninos
less
InterestsView All (9)
Uploads
Books
In this chapter we investigate the principal security issues for protecting ad hoc networks at the data link and network layers. The security requirements for these two layers are identified and the design criteria for creating secure ad hoc networks using multiple lines of defense against malicious attacks are discussed. Furthermore, we explore challenge–response protocols based on symmetric and asymmetric techniques for multiple authentication purposes through simulations and present our experimental results. In Particular, we implement the Advanced Encryption Standard (AES), RSA, and message digest version 5 (MD5) algorithms in combination with ISO/IEC 9798-2 and ISO/IEC 9798-4, and Needham–Schroeder authentication protocols.
Papers
In this chapter we investigate the principal security issues for protecting ad hoc networks at the data link and network layers. The security requirements for these two layers are identified and the design criteria for creating secure ad hoc networks using multiple lines of defense against malicious attacks are discussed. Furthermore, we explore challenge–response protocols based on symmetric and asymmetric techniques for multiple authentication purposes through simulations and present our experimental results. In Particular, we implement the Advanced Encryption Standard (AES), RSA, and message digest version 5 (MD5) algorithms in combination with ISO/IEC 9798-2 and ISO/IEC 9798-4, and Needham–Schroeder authentication protocols.