People
  1. Students
  2. Alumni
  3. Honorary Graduates
  4. Academic Experts
People

Contact Information

Contact

Visit Nikos Komninos

A304G, College Building

null

Postal Address

City, University of London
Northampton Square
London
EC1V 0HB
United Kingdom

About

Overview

Dr Nikos Komninos received his Ph.D. in 2003 from Lancaster University (UK) in Information Security. He is currently a Lecturer (US System: Assistant Professor) in Cyber Security in the Department of Computer Science at City University London. Prior to his current post, he has held teaching and research positions at the University of Cyprus, Carnegie Mellon University in Athens (Athens Information Technology), University of Piraeus, University of Aegean, and University of Lancaster.

Between 2003 and 2007, he was an honorary research fellow of the Department of Communication Systems at the University of Lancaster. He was also a visiting faculty member at the University of Cyprus and a faculty member at Carnegie Mellon University in Athens (Athens Information Technology), between 2005 and 2013. Part of his research has been patented and used in mobile phones by Telecommunication companies; in crypto-devices by Defense companies; and in healthcare applications by National Health Systems.

Since 2000, he has participated, as a researcher or principal investigator, in a large number of European and National R&D projects in the area of information security, systems and network security. He has authored and co-authored more than fifty journal publications, book chapters and conference proceedings publications in his areas of interest. He has been invited to give talks at conferences and Governmental Departments, as well as to train employees in Greek and UK businesses.

Research

Cyber Security

- Intrusion Detection Techniques,
- Authentication & Key Agreement Protocols,
- Zero knowledge Protocols (Anonymous Communication),
- Trust Establishment, Data and User Privacy.

Lightweight Cryptography

- Block and Stream Ciphers Design,
- Hash Functions Analysis,
- Cryptanalytic Techniques.

eHealth Security

- PKI Systems,
- OSA/Parley Framework,
- Biosignal integrity/ confidentiality.

Publications

Book

  1. Komninos, N. (2010). Sensor Applications, Experimentation, and Logistics. Springer. ISBN 978-3-642-11869-2.

Chapters (12)

  1. Mantas, G., Komninos, N., Rodriguez, J., Logota, E. and Marques, H. (2015). Security for 5G Communications. Fundamentals of 5G Mobile Networks (pp. 207–220). ISBN 978-1-118-86746-4.
  2. Michalas, A., Komninos, N. and Prasad, N.R. (2011). Cryptographic Puzzles and Game Theory against DoS and DDos Attacks in Networks. In Clary, T.S. (Ed.), Horizons in Computer Science Research Nova Science Publishers Inc.. ISBN 978-1-61324-262-9.
  3. Komninos, N. and Christakis, G. (2010). An Intrusion Detection Model using Bayesian Game in
    Ad Hoc Networks.
    In Vegros, D. and Saenz, J. (Eds.), Peer-To-Peer Networks and Internet Policies Nova Science Publishers Inc.. ISBN 978-1-60876-287-3.
  4. Mantas, G., Lymperopoulos, D. and Komninos, N. (2010). Security in Smart Home Environment. In Lazakidou, A., Siassiakos, K. and Ioannou, K. (Eds.), Wireless Technologies for Ambient Assisted Living and Healthcare Medical Info Science Reference. ISBN 978-1-61520-805-0.
  5. Komninos, N., Vergados, D.D. and Douligeris, C. (2010). Security for Ad Hoc Networks. In Stavroulakis, P.P. and Stamp, M. (Eds.), Handbook of Information and Communication Security (pp. 421–432). Springer ISBN 978-3-642-04116-7.
  6. Komninos, N. (2009). Morpheus: A word oriented Stream Cipher. In Hopkins, R.D. and Tokere, W.P. (Eds.), Computer Security: Intrusion, Detection and Prevention Nova Science Publishers. ISBN 978-1-60692-781-6.
  7. Komninos, N. and Mantas, G. (2009). Intelligent Authentication and Key Agreement
    Mechanism for WLAN in e‐Hospital Applications.
    In Feng, J. (Ed.), Wireless Networks: Research Technology and Applications Nova Science Publishers. ISBN 978-1-60692-461-7.
  8. Komninos, N. (2009). Morpheus: A word oriented Stream Cipher. In Chen, R.E. (Ed.), Cryptography Research Perspect Nova Science Publishers. ISBN 978-1-60456-492-1.
  9. Komninos, N. and Kapetanopoulos, V. (2008). Dynamic Group Key Management in Ad Hoc
    Networks.
    In Turner, J.N. and Boyer, C.S. (Eds.), Ad Hoc Networks: New Research Nova Science Publishers. ISBN 978-1-60456-895-0.
  10. Komninos, N. (2007). A Transport Layer Security Protocol for Hybrid Networks. In Lee, T.S. (Ed.), Wireless Communications Research Trends (pp. 267–285). Nova Science Publishers. ISBN 978-1-60021-674-9.
  11. Komninos, N. (2007). PKI Systems. In Douligeris, C. and Serpanos, D.N. (Eds.), Network Security: Current Status and
    Future Directions
    Wiley-IEEE Press. ISBN 978-0-471-70355-6.
  12. Komninos, N. (2007). PKI Systems. Network Security: Current Status and Future Directions (pp. 409–418). ISBN 978-0-470-09974-2.

Conference Papers and Proceedings (39)

  1. Tselikis, C., Douligeris, C., Mitropoulos, S., Komninos, N. and Tselikis, G. (2017). Adaptation of a Conference Key Distribution System for the wireless ad hoc network. .
  2. Kamilaris, A., Pitsillides, A., Kondepudi, S. and Komninos, N. (2016). Privacy concerns in sharing personal consumption data through online applications. .
  3. Procopiou, A. and Komninos, N. (2015). Current and future threats framework in smart grid domain. .
  4. Komninos, N. and Junejo, A.K. (2015). Privacy Preserving Attribute Based Encryption for Multiple Cloud Collaborative Environment. .
  5. Mourouzis, T., Courtois, N. and Komninos, N. (2014). Advanced Truncated Differential Cryptanalysis of GOST Block Cipher. 2nd International Conference on Cryptography, Network Security and Applications in the Armed Forces 2 April, Vari Campus of the Hellenic Military Academy, Athens, Greece.
  6. Komninos, N., Mourouzis, T. and Courtois, N. (2014). Advanced Truncated Differential Cryptanalysis of GOST Block Cipher. 2nd International Conference on Cryptography, Network Security and Applications in the Armed Forces 1-2 April, Hellenic Military Academy, Athens, Greece.
  7. Komninos, N., Mourouzis, T. and Christofi, M. (2014). Towards a Combined Rotational-Differential Cryptanalytic Framework. 2nd International Conference on Cryptography, Network Security and Applications in the Armed Forces 1-2 April, Hellenic Military Academy, Athens, Greece.
  8. Michalas, A. and Komninos, N. (2014). The lord of the sense: A privacy preserving reputation system for participatory sensing applications. .
  9. Komninos, N., Tselikis, C. and Douligeris, C. (2013). SAnoVs: Secure Anonymous Voting Scheme for
    Clustered Ad Hoc Networks.
    18th IEEE Symposium on Computers and Communication (ISCC’13) 7-10 July, Croatia.
  10. Georgakakis, E., Komninos, N. and Douligeris, C. (2012). NAVI: Novel authentication with visual information. .
  11. Fengou, M.A., Mantas, G., Lymberopoulos, D. and Komninos, N. (2011). Healthcare Profile Management System in Smart Cards. International Conference on Advances in Computing, Control, and Telecommunication Technologies and Advances of Information & Communication Technology in Health Care (ICTHC 2011) 25-26 December, Jakarta, Indonesia.
  12. Sabouri, A., Komninos, N. and Douligeris, C. (2011). User Dependent Cryptography for Security in Future Mobile Telecommunication Systems. 18th IEEE International Conference on Telecommunications (ICT) 8-11 May, Ayia Nappa, Cyprus.
  13. Michalas, A., Komninos, N. and Prasad, N.R. (2011). Multiplayer Game for DDoS Attacks Resilience
    in Ad Hoc Networks.
    2nd International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (Wireless Vitae 2011) 28 Feb 2011 – 3 Mar 2011, Chennai, India.
  14. Fengou, M.-.A., Mantas, G., Lymberopoulos, D. and Komninos, N. (2011). Ubiquitous Healthcare Profile Management Applying Smart Card Technology. .
  15. Michalas, A., Oleshchuk, V.A., Komninos, N. and Prasad, N.R. (2011). Privacy-preserving scheme for mobile ad hoc networks. .
  16. Michalas, A., Komninos, N., Prasad, N.R. and Oleshchuk, V.A. (2010). New Client Puzzle Approach for DoS Resistance in Ad Hoc Networks. IEEE International Conference on Information Theory and Information Security (ICITIS’2010) 17-19 December, Beijing, China.
  17. Mantas, G., Lymperopoulos, D. and Komninos, N. (2010). A New Framework for Ubiquitous Context‐Aware Healthcare Applications. 10th IEEE International Conference on Information Technology and Applications in Biomedicine November, Corfu, Greece.
  18. (2010). Sensor Applications, Experimentation, and Logistics - First International Conference, SENSAPPEAL 2009, Athens, Greece, September 25, 2009, Revised Selected Papers. .
  19. Mantas, G., Lymperopoulos, D. and Komninos, N. (2009). Integrity Mechanism for eHealth Tele‐monitoring System in Smart Home Environment. 31st International Conference of the IEEE Engineering in Medicine and Biology Society 2-6 September, Minnesota, USA.
  20. Tselikis, C., Mitropoulos, S., Douligeris, C., Ladis, E., Georgouleas, K., Vangelatos, C. and Komninos, N. (2009). Empirical Study of Re‐Clustering in Ad Hoc Networks. 16th International Conference on Systems Signals & Image Processing (IWSSIP’2009) 18-19 June, Chalkida, Greece.
  21. Michalas, A., Dimitriou, T., Gianetsos, T., Komninos, N. and Prasad, N.R. (2009). Vulnerabilities of Decentralized Additive Reputation Systems Regarding the Privacy of Individual Votes. 3rd International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MobiSec 2011) 17-19 May, Aalborg, Demark.
  22. Tselikis, C., Mitropoulos, S., Douligeris, C., Ladis, E., Georgouleas, K., Vangelatos, C. and Komninos, N. (2009). Empirical study of clustering algorithms for wireless ad hoc networks. .
  23. Komninos, N. and Mantas, G. (2008). Efficient Group Key Agreement & Recovery in Ad Hoc
    Network.
    2nd IET International Conference on Wireless, Mobile & Multimedia Networks (ICWMMN 2008) 12-15 October, Beijing China.
  24. Tselikis, C., Mitropoulos, S., Douligeris, C. and Komninos, N. (2008). A Robust and Consistent Reclustering Algorithm in Mobile Ad Hoc Networks. IEEE International Wireless Communication and Mobile Computing Conference (IWCMC 2008) 6-8 August, Chania Crete Island, Greece.
  25. Tselikis, C., Douligeris, C., Mitropoulos, S. and Komninos, N. (2008). Consistent re-clustering in mobile ad hoc networks. .
  26. Komninos, N., Soroush, H. and Salajegheh, M. (2007). LEE: Light‐Weight Energy‐Efficient Encryption Algorithm for Sensor Networks. IEEE 9th International Symposium on Communication Theory & Applications (ISCTA’07) 16-20 July, Ambleside, UK.
  27. Komninos, N. (2007). Morpheus: Stream Cipher for Software & Hardware Applications. IEEE 9th International Symposium on Communication Theory & Applications (ISCTA’07) 16-20 July, Ambleside, UK.
  28. Mitrokosta, A., Komninos, N. and Douligeris, C. (2007). Intrusion Detection with Neural Networks and Watermarking Techniques for MANET. IEEE International Conference on Pervasive Services (ICPS’07) 15-20 July, Istanbul, Turkey.
  29. Komninos, N., Mitrokosta, A. and Douligeris, C. (2007). Towards an Effective Intrusion Response Engine Combined with Intrusion Detection in Ad Hoc Networks. 6th IFIP Annual Mediterranean Ad Hoc Networking Workshop (MED‐HOC‐NET’07) 13-15 June, Corfu, Greece.
  30. Komninos, N. and Dimitriou, T. (2007). Protecting Biometric Templates with Image Watermarking Techniques. .
  31. Komninos, N., Vergados, D. and Douligeris, C. (2006). Two‐Step Authentication in Mobile Ad Hoc Networks. Global Mobile Congress 11-16 October, Beijing, China.
  32. Komninos, N. and Dimitriou, T. (2006). Adaptive Authentication and Key Agreement Mechanism for Future Cellular Systems. 15th IST Mobile & Wireless Communications Summit 4-8 June, Mykonos, Greece.
  33. Komninos, N., Vergados, D. and Douligeris, C. (2006). Two-step authentication in mobile ad-hoc networks. .
  34. Komninos, N. and Honary, B. (2002). Security Enhancement for A5/1 Without Losing Hardware Efficiency in Future Mobile Systems. 3rd IEE International Conference on 3G Mobile Communication Technologies London.
  35. Komninos, N. and Honary, B. (2001). Modified WAP for Secure Voice and Video Communication. 2nd IEE International Conference on 3G Mobile Communication Technologies London.
  36. Komninos, N., Honary, B. and Darnell, M. (2001). An Efficient Stream Cipher Alpha1 for Mobile and Wireless Devices. .
  37. Komninos, N., Samarakoon, M.I. and Honary, B. (2000). Authentication and Key Distribution for Wired and Wireless Systems. 1st Annual Symposium on the Convergence of Telecommunications, Networking and Broadcasting Liverpool John Moores University, Liverpool, UK.
  38. Komninos, N. and Honary, B. Novel Methods for Enabling Public Key Schemes in Future Mobile Systems. 3rd IEE International Conference on 3G Mobile Communication Technologies London, UK.
  39. Komninos, N., Honary, B. and Darnell, M. Secure Communication Protocol for Mobile Multimedia Applications. 3rd International Symposium on Wireless Personal Multimedia Communications (WPMC’2000) Bangkok, Thailand.

Journal Articles (38)

  1. Mourouzis, T., Wojcik, M. and Komninos, N. (2016). On The Security Evaluation of Partial Password Implementations. arXiv Cornel University .
  2. Acarali, D., Rajarajan, M., Komninos, N. and Herwono, I. (2016). Survey of approaches and features for the identification of HTTP-based botnet traffic. Journal of Network and Computer Applications, 76, pp. 1–15. doi:10.1016/j.jnca.2016.10.007.
  3. Komninos, N., Philippou, E. and Pitsillides, A. (2014). Survey in smart grid and smart home security: Issues, challenges and countermeasures. IEEE Communications Surveys and Tutorials, 16(4), pp. 1933–1954. doi:10.1109/COMST.2014.2320093.
  4. Fengou, M.A., Mantas, G., Lymberopoulos, D., Komninos, N., Fengos, S. and Lazarou, N. (2012). A New Framework Architecture for Next Generation e-Health Services. IEEE Trans Inf Technol Biomed, (99) . doi:10.1109/TITB.2012.2224876.
  5. Georgakakis, E., Komninos, N. and Douligeris, C. (2012). NAVI: Novel authentication with visual information. Proceedings - IEEE Symposium on Computers and Communications pp. 000588–000595. doi:10.1109/ISCC.2012.6249360.
  6. Mantas, G., Lymberopoulos, D. and Komninos, N. (2012). PKI security in large-scale healthcare networks. J Med Syst, 36(3), pp. 1107–1116. doi:10.1007/s10916-010-9573-1.
  7. Tselikis, C., Mitropoulos, S., Komninos, N. and Douligeris, C. (2012). Degree-Based Clustering Algorithms for Wireless Ad Hoc Networks Under Attack. IEEE Communications Letters, 16, pp. 619–621. doi:10.1109/LCOMM.2012.031912.112484.
  8. Michalas, A., Dimitriou, T., Giannetsos, T., Komninos, N. and Prasad, N.R. (2012). Vulnerabilities of Decentralized Additive Reputation Systems Regarding the Privacy of Individual Votes. Wireless Personal Communications, 66, pp. 559–575. doi:10.1007/s11277-012-0734-z.
  9. Michalas, A., Komninos, N. and Prasad, N.R. (2012). Secure & Trusted Communication in Emergency Situations. 35th IEEE SARNOFF Symposium .
  10. Kolokouris, I., Zarokostas, N. and Komninos, N. (2011). Integrity and authenticity mechanisms for sensor networks. pp. 115–130.
  11. Mitrokotsa, A., Komninos, N. and Douligeris, C. (2011). Intrusion detection and response in ad hoc networks. pp. 19–51.
  12. Michalas, A., Komninos, N. and Prasad, N.R. (2011). Multiplayer game for DDoS attacks resilience in ad hoc networks. 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace and Electronic Systems Technology, Wireless VITAE 2011 . doi:10.1109/WIRELESSVITAE.2011.5940931.
  13. Sabouri, A., Komninos, N. and Douligeris, C. (2011). User dependent cryptography for security in future mobile telecommunication systems. 2011 18th International Conference on Telecommunications, ICT 2011 pp. 422–427. doi:10.1109/CTS.2011.5898962.
  14. Komninos, N. and Mantas, G. (2011). PEA: Polymorphic Encryption Algorithm based on quantum computation. International Journal of Systems, Control and Communications, 3(1), pp. 1–18. doi:10.1504/IJSCC.2011.039222.
  15. Michalas, A., Komninos, N. and Prasad, N.R. (2011). Mitigate DoS and DDoS Attack in Mobile Ad Hoc Networks. IJDCF, 3, pp. 14–36. doi:10.4018/jdcf.2011010102.
  16. Michalas, A., Komninos, N. and Prasad, N.R. (2011). The Importance of DoS Attacks in Smart Ad
    hoc Networks (SAN).
    Information Journal .
  17. Michalas, A., Komninos, N., Prasad, N.R. and Oleshchuk, V.A. (2010). New client puzzle approach for DoS resistance in ad hoc networks. Proceedings 2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010 pp. 568–573. doi:10.1109/ICITIS.2010.5689528.
  18. Mantas, G., Lymberopoulos, D. and Komninos, N. (2010). A new framework for ubiquitous context-aware healthcare applications. Proceedings of the IEEE/EMBS Region 8 International Conference on Information Technology Applications in Biomedicine, ITAB . doi:10.1109/ITAB.2010.5687758.
  19. Mitrokotsa, A., Komninos, N. and Douligeris, C. (2010). Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks. I. J. Network Security, 10, pp. 93–106.
  20. Mantas, G., Lymberopoulos, D. and Komninos, N. (2009). Integrity mechanism for eHealth tele-monitoring system in smart home environment. Conf Proc IEEE Eng Med Biol Soc, 2009, pp. 3509–3512. doi:10.1109/IEMBS.2009.5334524.
  21. Komninos, N. and Douligeris, C. (2009). LIDF: Layered intrusion detection framework for ad-hoc networks. Ad Hoc Networks, 7, pp. 171–182. doi:10.1016/j.adhoc.2008.01.001.
  22. Mantas, G., Lymberopoulos, D. and Komninos, N. (2009). Integrity mechanism for eHealth tele-monitoring system in smart home environment. Conference proceedings : ... Annual International Conference of the IEEE Engineering in Medicine and Biology Society. IEEE Engineering in Medicine and Biology Society. Conference, 2009, pp. 3509–3512.
  23. Komninos, N. and Douligeris, C. (2009). LIDF: Layered Intrusion Detection Framework in Ad Hoc Networks. Ad Hoc Networks, 7(1), pp. 171–182. doi:10.1016/j.adhoc.2008.01.001.
  24. Komninos, N. and Mantas, G. (2008). Efficient group key agreement & recovery in ad hoc networks. IET Conference Publications, (545 CP), pp. 25–28. doi:10.1049/cp:20080928.
  25. Mitrokotsa, A., Komninos, N. and Douligeris, C. (2007). Intrusion detection with neural networks and watermarking techniques for MANET. 2007 IEEE International Conference on Pervasive Services, ICPS pp. 118–127. doi:10.1109/PERSER.2007.4283901.
  26. Komninos, N., Vergados, D. and Douligeris, C. (2007). Detecting unauthorized and compromised nodes in mobile ad hoc networks. Ad Hoc Networks, 5, pp. 289–298. doi:10.1016/j.adhoc.2005.11.005.
  27. Komninos, N., Vergados, D.D. and Douligeris, C. (2007). Authentication in a layered security approach for mobile ad hoc networks. Computers & Security, 26, pp. 373–380. doi:10.1016/j.cose.2006.12.011.
  28. Komninos, N., Vergados, D.D. and Douligeris, C. (2007). Multifold node authentication in mobile ad hoc networks. Int. J. Communication Systems, 20, pp. 1391–1406. doi:10.1002/dac.882.
  29. Komninos, N. and Dimitriou, T. (2007). Protecting Biometric Templates with Image
    Watermarking Techniques.
    Advances in Biometrics: Lecture Notes in Computer Science, 4642, pp. 114–123.

    [publisher’s website]

  30. Komninos, N., Zarokostas, N. and Komninos, N. (2007). Integrity and Authenticity Mechanisms
    in Sensor Networks.
    International Journal on Computer Research, 15(1), pp. 57–72.
  31. Mitrokotsa, A., Komninos, N. and Douligeris, C. (2007). Intrusion Detection & Response in Ad Hoc
    Networks.
    Advances in Ad Hoc Network Security, International Journal on Computer Research, 15(1), pp. 23–55.
  32. Komninos, N., Vergados, D. and Douligeris, C. (2007). A two‐step Authentication Framework for Mobile Ad Hoc Networks. China Communications Journal, 4(1), pp. 28–39.
  33. Komninos, N., Vergados, D. and Douligeris, C. (2006). Layered security design for mobile ad hoc networks. Computers & Security, 25, pp. 121–130. doi:10.1016/j.cose.2005.09.005.
  34. Komninos, N. and Honary, B. (2002). Novel methods for enabling public key schemes in future mobile systems. IEE Conference Publication, (489), pp. 455–458.
  35. Komninos, N., Honary, B. and Darnell, M. (2002). Security enhancements for A 5/1 without loosing hardware efficiency in future mobile systems. IEE Conference Publication, (489), pp. 324–328.
  36. Komninos, N. and Honary, B. (2001). Modified wap for secure voice and video communication. IEE Conference Publication, (477), pp. 33–37.
  37. Komninos, N., Honary, B. and Darnell, M. (2001). An Efficient Stream Cipher Alpha1 for Mobile
    and Wireless Devices.
    Cryptography and Coding, 2260, pp. 294–306.
  38. Mitrokotsa, A., Komninos, N. and Douligeris, C. Towards an Effective Intrusion Response Engine Combined with Intrusion
    Detection in Ad Hoc Networks.
    .

Patent

  1. Komninos, N. and Honary, B. Cipher Apparatus. Patent no. GB2380916

Find us

City, University of London

Northampton Square

London EC1V 0HB

United Kingdom

Back to top

City, University of London is an independent member institution of the University of London. Established by Royal Charter in 1836, the University of London consists of 18 independent member institutions with outstanding global reputations and several prestigious central academic bodies and activities.