Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ioannis Broustis is active.

Publication


Featured researches published by Ioannis Broustis.


Bell Labs Technical Journal | 2012

Group authentication: A new paradigm for emerging applications

Ioannis Broustis; Ganapathy Subramanian Sundaram; Harish Viswanathan

Traditional secure registration protocols rely on client-server authentication procedures. This concept has been extended to support single client registration to multiple servers, using “single sign-on” protocols. In this paper, we design a framework to solve the “reverse single sign-on” problem: How can multiple clients securely register with the same server/network in a single registration procedure? The main advantage of our framework is that it allows multiple clients to register with an infrastructure, such as a cellular network, as a “group,” yet generate individual session keys as well as a group session key. With this, the process of authenticating a large number of clients is greatly simplified, thereby dramatically reducing overheads. With a view towards simplifying the exposition, we describe how our framework can be applied for performing group authentication of devices in the machine-to-machine context. While this is an immediate area of application, we outline other extensions of the framework in the application layer including webcasting in a social networking environment.


Bell Labs Technical Journal | 2012

Detecting and preventing machine-to-machine hijacking attacks in cellular networks

Ioannis Broustis; Ganapathy Subramanian Sundaram; Harish Viswanathan

Machine-to-machine (M2M) communications are increasingly popular over cellular networks, due to their unlimited potential and the low cost of deployment. As a result, M2M infrastructures are attractive targets to attackers. For instance, hackers may use a water meter to browse the web over a mobile network. Given the expected tremendous growth of the M2M market within the next few years, such attacks can have a devastating impact on the economics of mobile broadband. However, prior studies in the area of fraud have not considered the inherent properties of cellular M2M deployments. In this paper, we demonstrate how hijacking attacks apply to contemporary networks, and provide a solution for mitigating them. In particular, we propose a novel framework for detecting and preventing M2M device hijacking. Our solution is novel in two main ways: 1) It is network centric, and 2) it completely avoids the use of overhead-intensive cryptographic functions.


IEEE Transactions on Mobile Computing | 2011

MAC Layer Throughput Estimation in Impulse-Radio UWB Networks

Ioannis Broustis; Angelos Vlavianos; Prashant Krishnamurthy; Srikanth V. Krishnamurthy

The inherent channel characteristics of impulse-based UWB networks affect the MAC layer performance significantly. Most previous studies on evaluating MAC protocols are based on prolonged simulations and do not account for the multiple access interference due to multipath delay spread. In this work, we develop CTU, an analytical framework for Capturing the Throughput dependencies in UWB networks, while taking into account the PHY layer effects. The key attributes of CTU are: 1) It is modular; it can be easily modified to provide a basis for evaluating a wide range of MAC protocols for impulse-based UWB networks. The only requirements are that the MAC protocol under study be based on time-hopping and the modulation scheme be pulse position modulation; these are common design decisions in UWB networks. 2) It considers the channel characteristics in addition to MAC layer effects; CTU correlates probabilistically the multipath delay profile of the channel with the packet error rate. We employ CTU to evaluate the performance of different generic medium access procedure. We compare the results with those from extensive simulations and show the high accuracy of CTU. We use CTU to assess the impact of various system parameters on the MAC layer performance; we make several interesting observations that are discussed in depth.


Bell Labs Technical Journal | 2012

Secure enablement of real time applications: A novel end-to-end approach

Violeta Cakulev; Ioannis Broustis; Ganapathy Subramanian Sundaram

The Internet has evolved into a multi-service Internet Protocol (IP) network with support for various types of traffic, including multimedia. Given the relatively open nature of IP networks, securely enabling multimedia services is increasingly important. While protocols such as Secure Real Time Protocol (SRTP) provide container formats for various applications, the supporting security solutions lack end-to-end secure key management. In this paper, we propose a novel secure key management framework targeted for real time applications in multi-operator environments. In particular, by leveraging an Identity-Based Authenticated Key Exchange (IBAKE) protocol, we develop secure key management solutions to support two-party communications, conferencing applications, call forking, call redirect, and deferred delivery. Our framework eliminates the need for costly public key infrastructure (PKI) or other online solutions, overcomes the problem of key escrow while providing perfect forward and backwards secrecy, and works across applications and media types. Overall, our solution opens-up new lines of research and business opportunities in secure application enablement.


Archive | 2012

Discovering proximity devices in broadband networks

Violeta Cakulev; Ioannis Broustis; Semyon B. Mizikovsky


Archive | 2011

Secure registration of group of clients using single registration procedure

Ioannis Broustis; Ganapathy Subramanian Sundaram; Harish Viswanathan


Archive | 2012

SECURE COMMUNICATIONS FOR COMPUTING DEVICES UTILIZING PROXIMITY SERVICES

Ioannis Broustis; Violeta Cakulev


Archive | 2010

Method And Apparatus Of Automated Discovery In A Communication Network

Ganapathy Subramanian Sundaram; Semyon B. Mizikovsky; Ioannis Broustis


Archive | 2012

An EAP Authentication Method Based on Identity-Based Authenticated Key Exchange

Violeta Cakulev; Ioannis Broustis


Archive | 2012

Secure group messaging

Ganapathy Subramanian Sundaram; Ioannis Broustis; Violeta Cakulev

Collaboration


Dive into the Ioannis Broustis's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge