Skip to main content

Showing 1–42 of 42 results for author: Mastorakis, S

.
  1. arXiv:2505.11271  [pdf, other

    cs.CL cs.AI cs.IR cs.LG

    Semantic Caching of Contextual Summaries for Efficient Question-Answering with Language Models

    Authors: Camille Couturier, Spyros Mastorakis, Haiying Shen, Saravan Rajmohan, Victor Rühle

    Abstract: Large Language Models (LLMs) are increasingly deployed across edge and cloud platforms for real-time question-answering and retrieval-augmented generation. However, processing lengthy contexts in distributed systems incurs high computational overhead, memory usage, and network bandwidth. This paper introduces a novel semantic caching approach for storing and reusing intermediate contextual summari… ▽ More

    Submitted 16 May, 2025; originally announced May 2025.

    Comments: Preprint. Paper accepted at ICCCN 2025, the final version will appear in the proceedings

    ACM Class: I.2.7

  2. arXiv:2505.01315  [pdf, other

    cs.CL cs.AI

    Helping Large Language Models Protect Themselves: An Enhanced Filtering and Summarization System

    Authors: Sheikh Samit Muhaimin, Spyridon Mastorakis

    Abstract: The recent growth in the use of Large Language Models has made them vulnerable to sophisticated adversarial assaults, manipulative prompts, and encoded malicious inputs. Existing countermeasures frequently necessitate retraining models, which is computationally costly and impracticable for deployment. Without the need for retraining or fine-tuning, this study presents a unique defense paradigm tha… ▽ More

    Submitted 5 May, 2025; v1 submitted 2 May, 2025; originally announced May 2025.

  3. arXiv:2501.15395  [pdf, other

    cs.CR cs.NI

    Hiding in Plain Sight: An IoT Traffic Camouflage Framework for Enhanced Privacy

    Authors: Daniel Adu Worae, Spyridon Mastorakis

    Abstract: The rapid growth of Internet of Things (IoT) devices has introduced significant challenges to privacy, particularly as network traffic analysis techniques evolve. While encryption protects data content, traffic attributes such as packet size and timing can reveal sensitive information about users and devices. Existing single-technique obfuscation methods, such as packet padding, often fall short i… ▽ More

    Submitted 25 January, 2025; originally announced January 2025.

  4. arXiv:2501.15313  [pdf, other

    cs.CR

    I Know What You Did Last Summer: Identifying VR User Activity Through VR Network Traffic

    Authors: Sheikh Samit Muhaimin, Spyridon Mastorakis

    Abstract: Virtual Reality (VR) technology has gained substantial traction and has the potential to transform a number of industries, including education, entertainment, and professional sectors. Nevertheless, concerns have arisen about the security and privacy implications of VR applications and the impact that they might have on users. In this paper, we investigate the following overarching research questi… ▽ More

    Submitted 5 May, 2025; v1 submitted 25 January, 2025; originally announced January 2025.

  5. arXiv:2412.19830  [pdf, other

    cs.NI cs.AI

    A Unified Framework for Context-Aware IoT Management and State-of-the-Art IoT Traffic Anomaly Detection

    Authors: Daniel Adu Worae, Athar Sheikh, Spyridon Mastorakis

    Abstract: The rapid expansion of Internet of Things (IoT) ecosystems has introduced growing complexities in device management and network security. To address these challenges, we present a unified framework that combines context-driven large language models (LLMs) for IoT administrative tasks with a fine-tuned anomaly detection module for network traffic analysis. The framework streamlines administrative p… ▽ More

    Submitted 19 December, 2024; originally announced December 2024.

  6. arXiv:2410.21120  [pdf, other

    cs.LG

    FusedInf: Efficient Swapping of DNN Models for On-Demand Serverless Inference Services on the Edge

    Authors: Sifat Ut Taki, Arthi Padmanabhan, Spyridon Mastorakis

    Abstract: Edge AI computing boxes are a new class of computing devices that are aimed to revolutionize the AI industry. These compact and robust hardware units bring the power of AI processing directly to the source of data--on the edge of the network. On the other hand, on-demand serverless inference services are becoming more and more popular as they minimize the infrastructural cost associated with hosti… ▽ More

    Submitted 28 October, 2024; originally announced October 2024.

  7. arXiv:2408.01331  [pdf, other

    cs.LG

    UnifiedNN: Efficient Neural Network Training on the Cloud

    Authors: Sifat Ut Taki, Arthi Padmanabhan, Spyridon Mastorakis

    Abstract: Nowadays, cloud-based services are widely favored over the traditional approach of locally training a Neural Network (NN) model. Oftentimes, a cloud service processes multiple requests from users--thus training multiple NN models concurrently. However, training NN models concurrently is a challenging process, which typically requires significant amounts of available computing resources and takes a… ▽ More

    Submitted 5 August, 2024; v1 submitted 2 August, 2024; originally announced August 2024.

  8. arXiv:2407.07361  [pdf, other

    cs.NI cs.CR cs.LG

    Characterizing Encrypted Application Traffic through Cellular Radio Interface Protocol

    Authors: Md Ruman Islam, Raja Hasnain Anwar, Spyridon Mastorakis, Muhammad Taqi Raza

    Abstract: Modern applications are end-to-end encrypted to prevent data from being read or secretly modified. 5G tech nology provides ubiquitous access to these applications without compromising the application-specific performance and latency goals. In this paper, we empirically demonstrate that 5G radio communication becomes the side channel to precisely infer the user's applications in real-time. The key… ▽ More

    Submitted 20 July, 2024; v1 submitted 10 July, 2024; originally announced July 2024.

    Comments: 9 pages, 8 figures, 2 tables. This paper has been accepted for publication by the 21st IEEE International Conference on Mobile Ad-Hoc and Smart Systems (MASS 2024)

  9. arXiv:2406.03405  [pdf

    cs.LG cs.CR eess.SY

    Amalgam: A Framework for Obfuscated Neural Network Training on the Cloud

    Authors: Sifat Ut Taki, Spyridon Mastorakis

    Abstract: Training a proprietary Neural Network (NN) model with a proprietary dataset on the cloud comes at the risk of exposing the model architecture and the dataset to the cloud service provider. To tackle this problem, in this paper, we present an NN obfuscation framework, called Amalgam, to train NN models in a privacy-preserving manner in existing cloud-based environments. Amalgam achieves that by aug… ▽ More

    Submitted 28 October, 2024; v1 submitted 2 June, 2024; originally announced June 2024.

  10. arXiv:2405.17263  [pdf, other

    cs.ET cs.DB cs.DC cs.NI

    ReStorEdge: An edge computing system with reuse semantics

    Authors: Adrian-Cristian Nicolaescu, Spyridon Mastorakis, Md Washik Al Azad, David Griffin, Miguel Rio

    Abstract: This paper investigates an edge computing system where requests are processed by a set of replicated edge servers. We investigate a class of applications where similar queries produce identical results. To reduce processing overhead on the edge servers we store the results of previous computations and return them when new queries are sufficiently similar to earlier ones that produced the results,… ▽ More

    Submitted 28 May, 2024; v1 submitted 27 May, 2024; originally announced May 2024.

    Comments: 12 pages, submitted for publication in IEEE Transactions on Emerging Topics in Computing

  11. arXiv:2405.02682  [pdf, other

    cs.DC cs.NI

    Deduplicator: When Computation Reuse Meets Load Balancing at the Network Edge

    Authors: Md Washik Al Azad, Spyridon Mastorakis

    Abstract: Load balancing has been a fundamental building block of cloud and, more recently, edge computing environments. At the same time, in edge computing environments, prior research has highlighted that applications operate on similar (correlated) data. Based on this observation, prior research has advocated for the direction of "computation reuse", where the results of previously executed computational… ▽ More

    Submitted 4 May, 2024; originally announced May 2024.

    Comments: Accepted for publication by IFIP Networking 2024

  12. arXiv:2311.07502  [pdf, other

    cs.HC

    ARWalker: A Virtual Walking Companion Application

    Authors: Pubudu Wijesooriya, Aaron Likens, Nick Stergiou, Spyridon Mastorakis

    Abstract: Extended Reality (XR) technologies, including Augmented Reality (AR), have attracted significant attention over the past few years and have been utilized in several fields, including education, healthcare, and manufacturing. In this paper, we aim to explore the use of AR in the field of biomechanics and human movement through the development of ARWalker, which is an AR application that features vi… ▽ More

    Submitted 13 November, 2023; originally announced November 2023.

  13. arXiv:2311.06723  [pdf, other

    cs.ET cs.HC

    A Nonlinear Analysis Software Toolkit for Biomechanical Data

    Authors: Shifat Sarwar, Aaron Likens, Nick Stergiou, Spyridon Mastorakis

    Abstract: In this paper, we present a nonlinear analysis software toolkit, which can help in biomechanical gait data analysis by implementing various nonlinear statistical analysis algorithms. The toolkit is proposed to tackle the need for an easy-to-use and friendly analyzer for gait data where algorithms seem complex to implement in software and execute. With the availability of our toolkit, people withou… ▽ More

    Submitted 11 November, 2023; originally announced November 2023.

  14. arXiv:2309.14247  [pdf, other

    cs.NI cs.AI cs.LG

    Rethinking Internet Communication Through LLMs: How Close Are We?

    Authors: Sifat Ut Taki, Spyridon Mastorakis

    Abstract: In this paper, we rethink the way that communication among users over the Internet, one of the fundamental outcomes of the Internet evolution, takes place. Instead of users communicating directly over the Internet, we explore an architecture that enables users to communicate with (query) Large Language Models (LLMs) that capture the cognition of users on the other end of the communication channel.… ▽ More

    Submitted 25 September, 2023; originally announced September 2023.

  15. arXiv:2307.02429  [pdf, other

    cs.CR cs.NI

    DarkHorse: A UDP-based Framework to Improve the Latency of Tor Onion Services

    Authors: Md Washik Al Azad, Hasniuj Zahan, Sifat Ut Taki, Spyridon Mastorakis

    Abstract: Tor is the most popular anonymous communication overlay network which hides clients' identities from servers by passing packets through multiple relays. To provide anonymity to both clients and servers, Tor onion services were introduced by increasing the number of relays between a client and a server. Because of the limited bandwidth of Tor relays, large numbers of users, and multiple layers of e… ▽ More

    Submitted 5 July, 2023; originally announced July 2023.

    Comments: This paper has been accepted for publication by the 48th IEEE Conference on Local Computer Networks (LCN)

  16. arXiv:2306.06764  [pdf, other

    cs.NI cs.CR

    IoT-AD: A Framework To Detect Anomalies Among Interconnected IoT Devices

    Authors: Hasniuj Zahan, Md Washik Al Azad, Ihsan Ali, Spyridon Mastorakis

    Abstract: In an Internet of Things (IoT) environment (e.g., smart home), several IoT devices may be available that are interconnected with each other. In such interconnected environments, a faulty or compromised IoT device could impact the operation of other IoT devices. In other words, anomalous behavior exhibited by an IoT device could propagate to other devices in an IoT environment. In this paper, we ar… ▽ More

    Submitted 11 June, 2023; originally announced June 2023.

    Comments: Accepted for publication by the IEEE Internet of Things Journal. The copyright is with IEEE

  17. arXiv:2305.07803  [pdf, other

    cs.CR cs.DC

    The Case for the Anonymization of Offloaded Computation

    Authors: Md Washik Al Azad, Shifat Sarwar, Sifat Ut Taki, Spyridon Mastorakis

    Abstract: Computation offloading (often to external computing resources over a network) has become a necessity for modern applications. At the same time, the proliferation of machine learning techniques has empowered malicious actors to use such techniques in order to breach the privacy of the execution process for offloaded computations. This can enable malicious actors to identify offloaded computations a… ▽ More

    Submitted 12 May, 2023; originally announced May 2023.

    Comments: Accepted for publication by IEEE CLOUD 2023

  18. arXiv:2304.10204  [pdf, other

    cs.NI

    FoggyEdge: An Information Centric Computation Offloading and Management Framework for Edge-based Vehicular Fog Computing

    Authors: Muhammad Atif Ur Rehman, Muhammad Salahuddin, Spyridon Mastorakis, Byung-Seo Kim

    Abstract: The recent advances aiming to enable in-network service provisioning are empowering a plethora of smart infrastructure developments, including smart cities, and intelligent transportation systems. Although edge computing in conjunction with roadside units appears as a promising technology for proximate service computations, the rising demands for ubiquitous computing and ultra-low latency requirem… ▽ More

    Submitted 20 April, 2023; originally announced April 2023.

    Comments: This paper has been accepted for publication by the IEEE Intelligent Transportation System Magazine. The copyright is with IEEE and the final version will be published by IEEE

  19. arXiv:2304.07676  [pdf, other

    cs.CR

    Privacy-Enhanced Living: A Local Differential Privacy Approach to Secure Smart Home Data

    Authors: Nazar Waheed, Fazlullah Khan, Spyridon Mastorakis, Mian Ahmad Jan, Abeer Z. Alalmaie, Priyadarsi Nanda

    Abstract: The rapid expansion of Internet of Things (IoT) devices in smart homes has significantly improved the quality of life, offering enhanced convenience, automation, and energy efficiency. However, this proliferation of connected devices raises critical concerns regarding security and privacy of the user data. In this paper, we propose a differential privacy-based system to ensure comprehensive securi… ▽ More

    Submitted 6 August, 2023; v1 submitted 15 April, 2023; originally announced April 2023.

    Comments: Submitted to IEEE COINS

  20. arXiv:2303.07523  [pdf, other

    cs.MM cs.PF cs.SE

    Investigating the Characteristics and Performance of Augmented Reality Applications on Head-Mounted Displays: A Study of the Hololens Application Store

    Authors: Pubudu Wijesooriya, Sheikh Muhammad Farjad, Nikolaos Stergiou, Spyridon Mastorakis

    Abstract: Augmented Reality (AR) based on Head-Mounted Displays (HMDs) has gained significant traction over the recent years. Nevertheless, it remains unclear what AR HMD-based applications have been developed over the years and what their system performance is when they are run on HMDs. In this paper, we aim to shed light into this direction. Our study focuses on the applications available on the Microsoft… ▽ More

    Submitted 13 March, 2023; originally announced March 2023.

    Comments: This paper has been accepted for publication by IEEE ICC workshops 2023

  21. arXiv:2301.08564  [pdf, other

    cs.NI

    An NDN-Enabled Fog Radio Access Network Architecture With Distributed In-Network Caching

    Authors: Sifat Ut Taki, Spyridon Mastorakis

    Abstract: To meet the increasing demands of next-generation cellular networks (e.g., 6G), advanced networking technologies must be incorporated. On one hand, the Fog Radio Access Network (F-RAN), has been proposed as an enhancement to the Cloud Radio Access Network (C-RAN). On the other hand, efficient network architectures, such as Named Data Networking (NDN), have been recognized as prominent Future Inter… ▽ More

    Submitted 18 January, 2023; originally announced January 2023.

    Comments: Accepted for publication by IEEE ICC 2023

  22. Interest Flooding Attacks in Named Data Networking: Survey of Existing Solutions, Open Issues, Requirements and Future Directions (Extended version)

    Authors: Ahmed Benmoussa, Chaker Abdelaziz Kerrache, Nasreddine Lagraa, Spyridon Mastorakis, Abderrahmane Lakas, Abdou el Karim Tahari

    Abstract: Named Data Networking (NDN) is a prominent realization of the vision of Information-Centric Networking. The NDN architecture adopts name-based routing and location-independent data retrieval. Among other important features, NDN integrates security mechanisms and focuses on protecting the content rather than the communications channels. Along with a new architecture come new threats and NDN is no e… ▽ More

    Submitted 11 June, 2022; originally announced June 2022.

    Comments: Just accepted, ACM Computing Surveys(CSUR) 2022, 46 pages, 18 figures

    ACM Class: C.2.1

  23. arXiv:2203.14426  [pdf, other

    cs.NI

    An Information Centric Framework for Weather Sensing Data

    Authors: Robert Thompson, Eric Lyons, Ishita Dasgupta, Spyridon Mastorakis, Michael Zink, Susmit Shannigrahi

    Abstract: Weather sensing and forecasting has become increasingly accurate in the last decade thanks to high-resolution radars, efficient computational algorithms, and high-performance computing facilities. Through a distributed and federated network of radars, scientists can make high-resolution observations of the weather conditions on a scale that benefits public safety, commerce, transportation, and oth… ▽ More

    Submitted 27 March, 2022; originally announced March 2022.

    Comments: This paper has been accepted for publication by a workshop held in conjunction with the IEEE International Conference on Communications (ICC) 2022

  24. arXiv:2201.06050  [pdf, other

    cs.NI

    Harpocrates: Anonymous Data Publication in Named Data Networking

    Authors: Md Washik Al Azad, Reza Tourani, Abderrahmen Mtibaa, Spyridon Mastorakis

    Abstract: Named-Data Networking (NDN), a prominent realization of the Information-Centric Networking (ICN) vision, offers a request-response communication model where data is identified based on application-defined names at the network layer. This amplifies the ability of censoring authorities to restrict user access to certain data/websites/applications and monitor user requests. The majority of existing N… ▽ More

    Submitted 16 January, 2022; originally announced January 2022.

    Comments: This paper has been accepted by the ACM Symposium on Access Control Models and Technologies (SACMAT) 2022. The definite version of this work will be published by ACM as part of the SACMAT conference proceedings

  25. arXiv:2112.12388  [pdf, other

    cs.NI

    Reservoir: Named Data for Pervasive Computation Reuse at the Network Edge

    Authors: Md Washik Al Azad, Spyridon Mastorakis

    Abstract: In edge computing use cases (e.g., smart cities), where several users and devices may be in close proximity to each other, computational tasks with similar input data for the same services (e.g., image or video annotation) may be offloaded to the edge. The execution of such tasks often yields the same results (output) and thus duplicate (redundant) computation. Based on this observation, prior wor… ▽ More

    Submitted 23 December, 2021; originally announced December 2021.

    Comments: This paper has been accepted for publication by the 20th International Conference on Pervasive Computing and Communications (PerCom 2022)

  26. arXiv:2109.01608  [pdf, other

    cs.NI

    The Promise and Challenges of Computation Deduplication and Reuse at the Network Edge

    Authors: Md Washik Al Azad, Spyridon Mastorakis

    Abstract: In edge computing deployments, where devices may be in close proximity to each other, these devices may offload similar computational tasks (i.e., tasks with similar input data for the same edge computing service or for services of the same nature). This results in the execution of duplicate (redundant) computation, which may become a pressing issue for future edge computing environments, since su… ▽ More

    Submitted 31 March, 2022; v1 submitted 3 September, 2021; originally announced September 2021.

    Comments: This manuscript has been accepted for publication by the IEEE Wireless Communications Magazine

  27. arXiv:2107.07604  [pdf, other

    cs.NI

    CLEDGE: A Hybrid Cloud-Edge Computing Framework over Information Centric Networking

    Authors: Md Washik Al Azad, Susmit Shannigrahi, Nicholas Stergiou, Francisco R. Ortega, Spyridon Mastorakis

    Abstract: In today's era of Internet of Things (IoT), where massive amounts of data are produced by IoT and other devices, edge computing has emerged as a prominent paradigm for low-latency data processing. However, applications may have diverse latency requirements: certain latency-sensitive processing operations may need to be performed at the edge, while delay-tolerant operations can be performed on the… ▽ More

    Submitted 15 July, 2021; originally announced July 2021.

    Comments: This paper has been accepted for publication by the 46th IEEE Conference on Local Computer Networks (LCN)

  28. arXiv:2105.07711  [pdf, other

    cs.CR cs.NI

    Hash-MAC-DSDV: Mutual Authentication for Intelligent IoT-Based Cyber-Physical Systems

    Authors: Muhammad Adil, Mian Ahmad Jan, Spyridon Mastorakis, Houbing Song, Muhammad Mohsin Jadoon, Safia Abbas, Ahmed Farouk

    Abstract: Cyber-Physical Systems (CPS) connected in the form of Internet of Things (IoT) are vulnerable to various security threats, due to the infrastructure-less deployment of IoT devices. Device-to-Device (D2D) authentication of these networks ensures the integrity, authenticity, and confidentiality of information in the deployed area. The literature suggests different approaches to address security issu… ▽ More

    Submitted 17 May, 2021; originally announced May 2021.

    Comments: Accepted by the IEEE Internet of Things Journal. The copyright is with the IEEE

  29. arXiv:2104.14906  [pdf, other

    cs.CR cs.NI

    LightIoT: Lightweight and Secure Communication for Energy-Efficient IoT in Health Informatics

    Authors: Mian Ahmad Jan, Fazlullah Khan, Spyridon Mastorakis, Muhammad Adil, Aamir Akbar, Nicholas Stergiou

    Abstract: Internet of Things (IoT) is considered as a key enabler of health informatics. IoT-enabled devices are used for in-hospital and in-home patient monitoring to collect and transfer biomedical data pertaining to blood pressure, electrocardiography (ECG), blood sugar levels, body temperature, etc. Among these devices, wearables have found their presence in a wide range of healthcare applications. Thes… ▽ More

    Submitted 30 April, 2021; originally announced April 2021.

    Comments: This paper has been accepted for publication by the IEEE Transactions on Green Communications and Networking. The copyright is with the IEEE

  30. arXiv:2103.14941  [pdf, other

    cs.NI

    Networking and Computing in Biomechanical Research: Challenges and Directions

    Authors: Spyridon Mastorakis, Andreas Skiadopoulos, Susmit Shannigrahi, Aaron Likens, Boubakr Nour, Nicholas Stergiou

    Abstract: Biomechanics is a scientific discipline that studies the forces acting on a body and the effects they produce. In this paper, we bring together biomechanists and networking researchers to shed light into how research efforts in biomechanics, primarily related to the study of the human body, can be facilitated through networking and computing technologies, such as edge and cloud computing, Software… ▽ More

    Submitted 27 March, 2021; originally announced March 2021.

    Comments: Accepted for publication by the IEEE Communications Magazine

  31. arXiv:2103.02085  [pdf, other

    cs.NI

    Information-Centric Networking in Wireless Environments: Security Risks and Challenges

    Authors: Boubakr Nour, Spyridon Mastorakis, Rehmat Ullah, Nicholas Stergiou

    Abstract: Information-Centric Networking (ICN) has emerged as a paradigm to cope with the lack of built-in security primitives and efficient mechanisms for content distribution of today's Internet. However, deploying ICN in a wireless environment poses a different set of challenges compared to a wired environment, especially when it comes to security. In this paper, we present the security issues that may a… ▽ More

    Submitted 2 March, 2021; originally announced March 2021.

    Comments: This paper has been accepted for publication by the IEEE Wireless Communications Magazine. The final version will be published by the IEEE

  32. arXiv:2012.04624  [pdf, other

    cs.NI

    Access Control Mechanisms in Named Data Networks: A Comprehensive Survey

    Authors: Boubakr Nour, Hakima Khelifi, Rasheed Hussain, Spyridon Mastorakis, Hassine Moungla

    Abstract: Information-Centric Networking (ICN) has recently emerged as a prominent candidate for the Future Internet Architecture (FIA) that addresses existing issues with the host-centric communication model of the current TCP/IP-based Internet. Named Data Networking (NDN) is one of the most recent and active ICN architectures that provides a clean slate approach for Internet communication. NDN provides in… ▽ More

    Submitted 8 December, 2020; originally announced December 2020.

    Comments: This paper has been accepted for publication by the ACM Computing Surveys. The final version will be published by the ACM

  33. arXiv:2012.00593  [pdf, other

    physics.med-ph physics.bio-ph

    Irregular Metronomes as Assistive Devices to Promote Healthy Gait Patterns

    Authors: Aaron D. Likens, Spyridon Mastorakis, Andreas Skiadopoulos, Jenny A. Kent, Md Washik Al Azad, Nick Stergiou

    Abstract: Older adults and people suffering from neurodegenerative disease often experience difficulty controlling gait during locomotion, ultimately increasing their risk of falling. To combat these effects, researchers and clinicians have used metronomes as assistive devices to improve movement timing in hopes of reducing their risk of falling. Historically, researchers in this area have relied on metrono… ▽ More

    Submitted 24 November, 2020; originally announced December 2020.

    Comments: This paper has been accepted for publication by the 18th IEEE Annual Consumer Communications & Networking Conference (CCNC). The copyright is with the IEEE

  34. arXiv:2011.12095  [pdf, other

    cs.NI

    CCIC-WSN: An Architecture for Single Channel Cluster-based Information-Centric Wireless Sensor Networks

    Authors: Muhammad Atif Ur Rehman, Rehmat Ullah, Byung-Seo Kim, Boubakr Nour, Spyridon Mastorakis

    Abstract: The promising vision of Information-Centric Networking (ICN) and of its realization, Named Data Networking (NDN), has attracted extensive attention in recent years in the context of the Internet of Things (IoT) and Wireless Sensor Networks (WSNs). However, a comprehensive NDN/ICN-based architectural design for WSNs, including specially tailored naming schemes and forwarding mechanisms, has yet to… ▽ More

    Submitted 24 November, 2020; originally announced November 2020.

    Comments: This paper has been accepted for publication by the IEEE Internet of Things Journal. The copyright is with IEEE and the final version will be published by IEEE

  35. arXiv:2010.12997  [pdf, other

    cs.NI

    Named Data Networking for Content Delivery Network Workflows

    Authors: Rama Krishna Thelagathoti, Spyridon Mastorakis, Anant Shah, Harkeerat Bedi, Susmit Shannigrahi

    Abstract: In this work we investigate Named Data Networking's (NDN's) architectural properties and features, such as content caching and intelligent packet forwarding, in the context of a Content Delivery Network (CDN) workflows. More specifically, we evaluate NDN's properties for PoP (Point of Presence) to PoP and PoP to device connectivity. We use the Apache Traffic Server (ATS) platform to create an HTTP… ▽ More

    Submitted 24 October, 2020; originally announced October 2020.

    Comments: 6 pages. The paper has been accepted for publication by the 9th IEEE International Conference on Cloud Networking (CloudNet), 2020

  36. arXiv:2010.10334  [pdf, other

    cs.CR cs.LG cs.NI

    DLWIoT: Deep Learning-based Watermarking for Authorized IoT Onboarding

    Authors: Spyridon Mastorakis, Xin Zhong, Pei-Chi Huang, Reza Tourani

    Abstract: The onboarding of IoT devices by authorized users constitutes both a challenge and a necessity in a world, where the number of IoT devices and the tampering attacks against them continuously increase. Commonly used onboarding techniques today include the use of QR codes, pin codes, or serial numbers. These techniques typically do not protect against unauthorized device access-a QR code is physical… ▽ More

    Submitted 17 October, 2020; originally announced October 2020.

    Comments: 7 pages. This paper has been accepted for publication by the 18th IEEE Annual Consumer Communications & Networking Conference (CCNC). The copyright is with the IEEE. arXiv admin note: text overlap with arXiv:2007.02460

  37. arXiv:2007.07807  [pdf, other

    cs.NI cs.DC

    NDNTP: A Named Data Networking Time Protocol

    Authors: Abderrahmen Mtibaa, Spyridon Mastorakis

    Abstract: Named Data Networking (NDN) architectural features, including multicast data delivery, stateful forwarding, and in-network data caching, have shown promise for applications such as video streaming and file sharing. However, collaborative applications, requiring a multi-producer participation introduce new NDN design challenges. In this paper, we highlight these challenges in the context of the Net… ▽ More

    Submitted 15 July, 2020; originally announced July 2020.

    Comments: This paper has been accepted for publication by the IEEE Network Magazine

  38. arXiv:2007.02460  [pdf, other

    cs.MM cs.LG

    An Automated and Robust Image Watermarking Scheme Based on Deep Neural Networks

    Authors: Xin Zhong, Pei-Chi Huang, Spyridon Mastorakis, Frank Y. Shih

    Abstract: Digital image watermarking is the process of embedding and extracting a watermark covertly on a cover-image. To dynamically adapt image watermarking algorithms, deep learning-based image watermarking schemes have attracted increased attention during recent years. However, existing deep learning-based watermarking methods neither fully apply the fitting ability to learn and automate the embedding a… ▽ More

    Submitted 5 July, 2020; originally announced July 2020.

    Comments: This paper has been accepted for publication by the IEEE Transactions on Multimedia. The copyright is with the IEEE. DOI: 10.1109/TMM.2020.3006415

  39. arXiv:2006.01651  [pdf, other

    cs.NI

    DAPES: Named Data for Off-the-Grid File Sharing with Peer-to-Peer Interactions

    Authors: Spyridon Mastorakis, Tianxiang Li, Lixia Zhang

    Abstract: This paper introduces DAta-centric Peer-to-peer filE Sharing (DAPES), a data sharing protocol for scenarios with intermittent connectivity and user mobility. DAPES provides a set of semantically meaningful hierarchical naming abstractions that facilitate the exchange of file collections via local connectivity. This enables peers to "make the most" out of the limited connection time with other peer… ▽ More

    Submitted 2 June, 2020; originally announced June 2020.

    Comments: This paper was accepted for publication at the 40th IEEE International Conference on Distributed Computing Systems (ICDCS). The copyright is with the IEEE

  40. arXiv:1911.07289  [pdf, other

    cs.NI

    Experimenting with a Simulation Framework for Peer-to-Peer File Sharing in Named Data Networking

    Authors: Akshay Raman, Kimberly Chou, Spyridon Mastorakis

    Abstract: Peer-to-peer file sharing envisions a data-centric dissemination model, where files consisting of multiple data pieces can be shared from any peer that can offer the data or from multiple peers simultaneously. This aim, implemented at the application layer of the network architecture, matches with the objective of Named Data Networking (NDN), a proposed Internet architecture that features a data-c… ▽ More

    Submitted 17 November, 2019; originally announced November 2019.

  41. arXiv:1802.06970  [pdf, other

    cs.NI cs.CR

    ISA-Based Trusted Network Functions And Server Applications In The Untrusted Cloud

    Authors: Spyridon Mastorakis, Tahrina Ahmed, Jayaprakash Pisharath

    Abstract: Nowadays, enterprises widely deploy Network Functions (NFs) and server applications in the cloud. However, processing of sensitive data and trusted execution cannot be securely deployed in the untrusted cloud. Cloud providers themselves could accidentally leak private information (e.g., due to misconfigurations) or rogue users could exploit vulnerabilities of the providers' systems to compromise e… ▽ More

    Submitted 20 February, 2018; originally announced February 2018.

  42. arXiv:1802.03072  [pdf, other

    cs.NI

    Experimentation With Fuzzy Interest Forwarding in Named Data Networking

    Authors: Spyridon Mastorakis, Kevin Chan, Bongjun Ko, Alexander Afanasyev, Lixia Zhang

    Abstract: In the current Named Data Networking implementation, forwarding a data request requires finding an exact match between the prefix of the name carried in the request and a forwarding table entry. However, consumers may not always know the exact naming, or an exact prefix, of their desired data. The current approach to this problem-establishing naming conventions and performing name lookup-can be in… ▽ More

    Submitted 14 February, 2018; v1 submitted 8 February, 2018; originally announced February 2018.

    Comments: 10 pages, 13 figures