Georgios Mantas
University of Patras
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Georgios Mantas.
IEEE Journal of Biomedical and Health Informatics | 2013
Maria-Anna Fengou; Georgios Mantas; Dimitrios K. Lymberopoulos; Nikos Komninos; Spyros L. Fengos; Nikolaos Lazarou
The challenge for fast and low-cost deployment of ubiquitous personalized e-Health services has prompted us to propose a new framework architecture for such services. We have studied the operational features and the environment of e-Health services and we led to a framework structure that extends the European Telecommunications Standards Institute (ETSI)/Parlay architecture, which is used for the deployment of standardized services over the next generation IP networks. We expanded the ETSI/Parlay architecture with new service capability features as well as sensor, profiling, and security mechanisms. The proposed framework assists the seamless integration, within the e-Health service structure, of diverse facilities provided by both the underlying communication and computing infrastructure as well as the patients bio and context sensor networks. Finally, we demonstrate the deployment of a telemonitoring service in smart home environment based on the proposed framework architecture.
international conference of the ieee engineering in medicine and biology society | 2012
Maria-Anna Fengou; Georgios Mantas; Dimitrios K. Lymberopoulos
Nowadays, ubiquitous healthcare is of utmost importance in the patient-centric model. Furthermore, the personalization of ubiquitous healthcare services plays a very important role to make the patient-centric model a reality. The personalization of the ubiquitous healthcare services is based on the profiles of the entities participating in these services. In this paper, we propose a group profile management system in a ubiquitous healthcare environment. The proposed system is responsible for the dynamic creation of a group profile and its management.
international conference of the ieee engineering in medicine and biology society | 2009
Georgios Mantas; Dimitrios K. Lymberopoulos; Nikos Komninos
During the past few years, a lot of effort has been invested in research and development of eHealth tele-monitoring systems that will provide many benefits for healthcare delivery from the healthcare provider to the patients home. However, there is a plethora of security requirements in eHealth tele-monitoring systems. Data integrity of the transferred medical data is one of the most important security requirements that should be satisfied in these systems, since medical information is extremely sensitive information, and even sometimes life threatening information. In this paper, we present a data integrity mechanism for eHealth tele-monitoring system that operates in a smart home environment. Agent technology is applied to achieve data integrity with the use of cryptographic smart cards. Furthermore, the overall security infrastructure and its various components are described.
IEEE Internet of Things Journal | 2017
Alireza Esfahani; Georgios Mantas; Rainer Matischek; Firooz B. Saghezchi; Jonathan Rodriguez; Ani Bicaku; Silia Maksuti; Markus Tauber; Christoph Schmittner; Joaquim Bastos
In the emerging industrial Internet of Things (IIoT) era, machine-to-machine (M2M) communication technology is considered as a key underlying technology for building IIoT environments, where devices (e.g., sensors, actuators, and gateways) are enabled to exchange information with each other in an autonomous way without human intervention. However, most of the existing M2M protocols that can be also used in the IIoT domain provide security mechanisms based on asymmetric cryptography resulting in high computational cost. As a consequence, the resource-constrained IoT devices are not able to support them appropriately and thus, many security issues arise for the IIoT environment. Therefore, lightweight security mechanisms are required for M2M communications in IIoT in order to reach its full potential. As a step toward this direction, in this paper, we propose a lightweight authentication mechanism, based only on hash and XOR operations, for M2M communications in IIoT environment. The proposed mechanism is characterized by low computational cost, communication, and storage overhead, while achieving mutual authentication, session key agreement, device’s identity confidentiality, and resistance against the following attacks: replay attack, man-in-the-middle attack, impersonation attack, and modification attack.
International Journal of Distributed Sensor Networks | 2015
Alireza Esfahani; Du Yang; Georgios Mantas; Alberto Nascimento; Jonathan Rodriguez
Network coding has shown a considerable improvement in terms of capacity and robustness compared to traditional store-and-forward transmission paradigm. However, since the intermediate nodes in network coding-enabled networks have the ability to change the packets en route, network coding-enabled networks are vulnerable to pollution attacks where a small number of polluted messages can corrupt bunches of legitimate messages. Recently, research effort has been put on schemes for protecting the transmitted messages against data pollution attacks. However, most of them cannot resist tag pollution attacks. This paper presents a new homomorphic MAC-based scheme, called Dual-Homomorphic MAC (Dual-HMAC), for network coding-enabled wireless sensor networks. The proposed scheme makes use of two types of tags (i.e., MACs and D-MACs) to provide resistance against data pollution attacks and partially tag pollution attacks. Furthermore, our proposed scheme presents low communication overhead and low computational complexity compared to other existing schemes.
Journal of Medical Systems | 2012
Georgios Mantas; Dimitrios K. Lymberopoulos; Nikos Komninos
During the past few years a lot of PKI (Public Key Infrastructures) infrastructures have been proposed for healthcare networks in order to ensure secure communication services and exchange of data among healthcare professionals. However, there is a plethora of challenges in these healthcare PKI infrastructures. Especially, there are a lot of challenges for PKI infrastructures deployed over large-scale healthcare networks. In this paper, we propose a PKI infrastructure to ensure security in a large-scale Internet-based healthcare network connecting a wide spectrum of healthcare units geographically distributed within a wide region. Furthermore, the proposed PKI infrastructure facilitates the trust issues that arise in a large-scale healthcare network including multi-domain PKI infrastructures.
bioinformatics and bioengineering | 2013
Georgia N. Athanasiou; Georgios Mantas; Maria-Anna Fengou; Dimitrios K. Lymberopoulos
Ubiquitous Healthcare environment materializes the patient-centric paradigm providing healthcare services without spatial and temporal limitations. However, the nature of Ubiquitous Healthcare services requiring exchange of sensitive personal data raises trust issues. In this paper, we propose a profile-based Trust Management scheme that enables the patient to select the most trustworthy Healthcare Provider in a Ubiquitous Healthcare environment. Furthermore, we propose an extended User Profile structure integrating trust-related information in order to enhance the functionality of the proposed Trust Management scheme.
international conference on wireless mobile communication and healthcare | 2011
Maria-Anna Fengou; Georgios Mantas; Dimitrios K. Lymberopoulos; Nikos Komninos
Nowadays, the patient-centric healthcare approach is focused on ubiquitous healthcare services. Furthermore, the adoption of cloud computing technology leads to more efficient ubiquitous healthcare systems. Moreover, the personalization of the delivery of ubiquitous healthcare services is enabled with the introduction of user profiles. In this paper, we propose five generic healthcare profile structures corresponding to the main categories of the participating entities included in a typical ubiquitous healthcare system in a cloud computing environment. In addition, we propose a profile management system incorporating smart card technology to increase its efficiency and the quality of the provided services of the ubiquitous healthcare system.
biomedical and health informatics | 2014
Georgia N. Athanasiou; Georgios Mantas; Maria-Anna Fengou; Dimitrios K. Lymberopoulos
In healthcare, trust is considered to be the key factor for the provision of effective healthcare services. Thus, ubiquitous healthcare environment incorporate Trust Management systems or services for enabling the creation of confident and secure background required for the provision of healthcare services. In this paper the concept of personalized Trust Management service is introduced. However, since this approach makes the service vulnerable to users subjectivity in this paper is proposed a mechanism that determines the proper in case personalization factor. Especially, it quantifies the Quality of trust Information that user has acquired from past interactions and determines if he/she is capable to discover and select healthcare providers. The introduced mechanism is deployed on a Fuzzy Interference System and its performance was evaluated through simulations in MATLAB/SIMULINK environment.
IEEE Communications Letters | 2016
Alireza Esfahani; Georgios Mantas; Jonathan Rodriguez
This letter proposes an efficient null space-based homomorphic message authentication code scheme providing resistance against tag pollution attacks in random linear network coding, where these attacks constitute a severe security threat. In contrast to data pollution attacks, where an adversary injects into the network corrupted packets, in tag pollution attacks the adversary corrupts (i.e. pollutes) tags appended to the end of the coded packets to prevent the destination nodes from decoding correctly. Our results show that the proposed scheme is more efficient compared to other competitive tag pollution immune schemes in terms of computational complexity.