• Home
  • Konstantinos Fysarakis
Konstantinos Fysarakis

Konstantinos Fysarakis
Sphynx Analytics Ltd

PhD Electronic & Computer Engineering, MSc Information Security, BSc Applied Mathematics

About

65
Publications
55,622
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
927
Citations
Additional affiliations
February 2021 - present
Sphynx Analytics Ltd
Position
  • Chief Technology Officer
Description
  • Responsible for scientific and technological activities’ management and coordination.
May 2018 - January 2021
Sphynx Technology Solutions AG
Position
  • Chief Technology Officer
Description
  • Responsible for scientific and technological activities’ management and coordination.
February 2016 - April 2018
Foundation for Research and Technology - Hellas
Position
  • Researcher
Description
  • Projects: VirtuWind (H2020-ICT-2014-2 call), SHARCS (H2020-ICT-2014-1 call), CIPSEC (H2020-DS-2015-1 call), CyberSure (H2020 Marie Skłodowska-Curie)
Education
June 2012 - April 2016
Technical University of Crete
Field of study
  • Dept. of Electronic & Computer Engineering, Embedded Systems Security
September 2006 - September 2007
Royal Holloway, University of London
Field of study
  • Information Security
September 1999 - September 2005
University of Crete
Field of study
  • Applied Mathematics

Publications

Publications (65)
Article
Full-text available
Security and privacy (SP)-related challenges constitute a significant barrier to the wider adoption of Internet of Things (IoT)/Industrial IoT (IIoT) devices and the associated novel applications and services. In this context, patterns, which are constructs encoding re-usable solutions to common problems and building blocks to architectures, can be...
Chapter
Full-text available
The orchestration of heterogeneous IoT devices to enable the provision of IoT applications and services poses numerous challenges, especially in contexts where end-to-end security and privacy guarantees are needed. To tackle these challenges, this paper presents a pattern–driven approach for interacting with IoT systems, whereby the required proper...
Article
The increase in the world's population has led to a massive rise in human consumption of the planet's natural resources, well beyond their replacement rate. Traditional recycling concepts and methods are not enough to counter such effects. In this context, a circular economy (CE), that is, a restorative and regenerative by-design economy, can refor...
Chapter
Full-text available
The use of smart technologies in medicine and healthcare has been steadily increasing over the last years. Health and well-being monitoring systems are now deployed in homes, at work, and in everyday environments to support health, smart homes and age-friendly workplaces. A large variety of different off-the-shelf smart sensors and medical devices...
Chapter
Full-text available
The intelligence being built into modern vehicles significantly improves passenger safety and comfort, and this trend is expected to intensify in the coming years. Smart, eventually self-driving, vehicles are expected to form an important segment of the Internet of Things (IoT) –enabled word, introducing new modes of transportation and new types of...
Article
Full-text available
The adoption of Internet of Things (IoT) devices, applications and services gradually transform our everyday lives. In parallel, the transition from linear to circular economic (CE) models provide an even more fertile ground for novel types of services, and the update and enrichment of legacy ones. To fully realize the potential of the interplay be...
Article
Full-text available
Eco-friendly systems are necessitated nowadays, as the global consumption is increasing. A data-driven aspect is prominent, involving the Internet of Things (IoT) as the main enabler of a Circular Economy (CE). Henceforth, IoT equipment records the system’s functionality, with machine learning (ML) optimizing green computing operations. Entities ex...
Article
Full-text available
Structured approaches to the definition of service orchestrations facilitate the composition of components and services and allow for more capable and powerful applications, while introducing many advantages such as service reusability, cost reduction, and simplification of organization alliances. A variety of such approaches exist in the literatur...
Article
Full-text available
The railway transport system is critical infrastructure that is exposed to numerous man-made and natural threats, thus protecting this physical asset is imperative. Cyber security, privacy, and dependability (SPD) are also important, as the railway operation relies on cyber-physical systems (CPS) systems. This work presents SPD-Safe—an administrati...
Conference Paper
Full-text available
In light of the ever-increasing complexity and criticality of applications supported by ICT infrastructures, Cyber Ranges emerge as a promising solution to effectively train people within organisations on cyber-security aspects, thus providing an efficient mechanism to manage the associated risks. Motivated by this, the work presented herein introd...
Article
Full-text available
Modern educational tools and computer technologies are now getting adapted in the cyber-ranges field. Simulation, emulation, as well as serious gaming provide an enhanced training experience under realistic conditions and accurate operational environments. The THREAT-ARREST Horizon-2020 project is developing a model-driven platform for professional...
Chapter
Cyber security is always a main concern for critical infrastructures and nation-wide safety and sustainability. Thus, advanced cyber ranges and security training is becoming imperative for the involved organizations. This paper presets a cyber security training platform, called THREAT-ARREST. The various platform modules can analyze an organization...
Chapter
Full-text available
Security demands are increasing for all types of organisations, due to the ever-closer integration of computing infrastructures and smart devices into all aspects of the organisational operations. Consequently, the need for security-aware employees in every role of an organisation increases in accordance. Cyber Range training emerges as a promising...
Article
Full-text available
Various tools support developers in the creation of IoT applications. In general, such tools focus on the business logic, which is important for application development, however, for IoT applications in particular, it is crucial to consider the network, as they are intrinsically based on interconnected devices and services. IoT application develope...
Conference Paper
The advent of the Internet of Things opens a plethora of possibilities, provided the research and industry com- munities are able to overcome a number of challenges such as the dynamicity, scalability, heterogeneity and end-to-end security and privacy requirements of such environments. Motivated by these challenges, this paper proposes leveraging a...
Conference Paper
Full-text available
Interoperability stands for the capacity of a system to interact with the units of another entity. Although it is quite easy to accomplish this within the products of the same brand, it is not facile to provide compatibility for the whole spectrum of the Internet-of-Things (IoT) and the Linked Data (LD) world. Currently, the different applications...
Chapter
The innovative capabilities of 5G technologies, such as software‐defined networking (SDN) and network function virtualization (NFV), open up a variety of possibilities for improved and novel service provisioning. Nevertheless, technologies such as SDN expand the attack surface of the communication infrastructure, thus necessitating the introduction...
Conference Paper
Full-text available
Cyber security is always a main concern for critical infrastructures and nation-wide safety and sustainability. Thus, advanced cyber ranges and security training is becoming imperative for the involved organizations. This paper presets a cyber security training platform, called THREAT-ARREST. The various platform modules can analyze an organization...
Conference Paper
Security demands are increasing for all types of organisations, due to the ever-closer integration of computing infrastructures and smart devices into all aspects of the organisational operations. Consequently, the need for security-aware employees in every role of an organisation increases in accordance. Cyber Range training emerges as a promising...
Conference Paper
Full-text available
Achieving Security, Privacy, Dependability and In-teroperability (SPDI) is of paramount importance for the ubiquitous deployment and impact maximization of Internet of Things (IoT) applications. Nevertheless, said requirements are not only difficult to achieve at system initialization, but also hard to prove and maintain at run-time. This paper hig...
Conference Paper
Full-text available
Next generation networks, as the Internet of Things (IoT), aim to create open and global networks for connecting smart objects, network elements, applications, web services and end-users. Research and industry attempt to integrate this evolving technology and the exponential growth of IoT by overcoming significant hurdles such as dynamicity, scalab...
Conference Paper
Full-text available
The vast amount of connected devices on the Internet of Things (IoT) creates an enormous potential for new applications, by leveraging synergies arising through the convergence of consumer, business and industrial Internet, and creating open, global networks connecting people, data, and "things". In this context, the SEMIoTICS project aims to devel...
Conference Paper
Full-text available
The growth of the global middle class provokes significant increment in product consumption. As the available resources are limited, Circular Economy (CE) raises as a promising initiative towards the sustainable development. Except from the traditional approaches of reusing or recycling products, the current trend utilizes modern computer technolog...
Article
Full-text available
Botnets constitute nowadays one of the most dangerous security threats worldwide. High volumes of infected machines are controlled by a malicious entity and perform coordinated cyber-attacks. The problem will become even worse in the era of the Internet of Things (IoT) as the number of insecure devices is going to be exponentially increased. This p...
Chapter
Full-text available
In the modern applications for Internet-of-Things (IoT) and Cyber-Physical Systems (CPSs) heterogeneous embedded devices exchange high volumes of data. Interconnection with cloud services is becoming popular. Thus, enhanced security is imperative but network monitoring is computational intensive. Parallel programming utilizing Graphics Processing U...
Conference Paper
Full-text available
This paper presents an overview of the interoperability concepts along with the challenges for the IoT domain and the upcoming Web 3.0. We identify four levels of interoperability and the relevant solutions for accomplishing vertical and horizontal compatibility between the various layers of a modern IoT ecosystem, referred to as: technological, sy...
Conference Paper
Full-text available
A popular application of ambient intelligence systems constitutes of assisting living services on smart buildings. As intelligence is imported in embedded equipment the system becomes able to provide smart services (e.g. control lights, airconditioning, provide energy management services etc.). IoT is the main enabler of such environments. However,...
Conference Paper
Full-text available
In the modern applications for Internet-of-Things (IoT) and Cyber-Physical Systems (CPSs) heterogeneous embedded devices exchange high volumes of data. Interconnection with cloud services is becoming popular. Thus, enhanced security is imperative but network monitoring is computational intensive. Parallel programming utilizing Graphics Processing U...
Article
Full-text available
Embedded systems are deployed in various domains, including industrial installations, critical and nomadic environments, private spaces and public infrastructures. Their operation typically involves access, storage and communication of sensitive and/or critical information that requires protection, making the security of their resources and service...
Conference Paper
Full-text available
The Internet of Things (IoT) is gradually becoming a reality, supported by an assortment of heterogeneous devices, varying from resource-starved wireless sensors to embedded devices and resource-rich backend systems, which are supplemented by a range of networking technologies and protocols. Nevertheless, this diverse ecosystem of platforms and pro...
Article
Full-text available
Smart interconnected devices, including Cyber-Physical Systems (CPS), permeate our lives and are now an integral part of our daily activities, paving the way towards the Internet of Things (IoT). In the industrial domain, these devices interact with their surroundings and system operators, while often also integrating industrial cloud applications....
Chapter
Full-text available
VirtuWind proposes the application of Software Defined Networking (SDN) and Network Functions Virtualization (NFV) in critical infrastructure networks. We aim at introducing network programmability, reconfigurability and multi-tenant capability both inside isolated and inter-connected industrial networks. Henceforth, we present the design of the Vi...
Article
Full-text available
The innovative application of 5G core technologies, namely Software Defined Networking (SDN) and Network Function Virtualization (NFV), can help reduce capital and operational expenditures in industrial networks. Nevertheless, SDN expands the attack surface of the communication infrastructure, thus necessitating the introduction of additional secur...
Conference Paper
Full-text available
Railways constitute a main means of mass transportation, used by public, private, and military entities to traverse long distances every day. Railway control software must collect spatial information and effectively manage these systems. Wireless sensor networks (WSNs) are an attractive solution to cover the area along-side the railway routes. In-c...
Conference Paper
Full-text available
The innovative application of 5G core technologies, namely Software Defined Networking (SDN) and Network Function Virtualization (NFV), can help reduce capital and operational expenditures in industrial networks. Nevertheless, SDN expands the attack surface of the communication infrastructure, thus necessitating the introduction of additional secur...
Conference Paper
Full-text available
Massive advancements in computing and communication technologies have enabled the ubiquitous presence of interconnected computing devices in all aspects of modern life, forming what is typically referred to as the “Internet of Things”. These major changes could not leave the industrial environment unaffected, with “smart” industrial deployments gra...
Conference Paper
Full-text available
Computing devices already permeate working and living environments, while researchers and engineers aim to exploit the potential of pervasive systems in order to introduce new types of services and address inveterate and emerging problems. This process will lead us eventually to the era of urban computing and the Internet of Things (IoT). However,...
Article
Full-text available
Computing devices permeate working and living environments, affecting all aspects of modern everyday lives; a trend which is expected to intensify in the coming years. In the residential setting, the enhanced features and services provided by said computing devices constitute what is typically referred to as a “smart home”. However, the direct inte...
Thesis
Full-text available
Computing devices already permeate working and living environments, a trend affecting all aspects of modern everyday lives, and one that is expected to intensify in the coming years. As computing becomes ubiquitous, researchers and engineers aim to exploit the potential of pervasive systems in order to introduce new types of services and address in...
Article
Full-text available
Pervasive computing constitutes a growing trend, aiming to embed smart devices into everyday objects. The limited resources of these devices and the ever-present need for lower production costs, lead to the research and development of lightweight cryptographic mechanisms. Block ciphers, the main symmetric key cryptosystems, perform well in this fie...
Article
Full-text available
Monitoring traps are important components of integrated pest management applied against important fruit fly pests, including Bactrocera oleae (Gmelin) and Ceratitis capitata (Widemann), Diptera of the Tephritidae family, which effect a crop-loss/per year calculated in billions of euros worldwide. Pests can be controlled with ground pesticide sprays...
Conference Paper
Full-text available
Ubiquitous devices comprising several resource-constrained sensors & actuators while having the long desired Internet connectivity, are becoming part of many solutions that seek to enhance user's environment smartness and quality of living. Their intrinsic resource limitations however constitute critical requirements, such as security, a great chal...
Conference Paper
Full-text available
Computing devices already permeate working and living environments; a trend which is expected to intensify in the coming years. However, the direct interaction smart devices often have with the physical world, along with the processing, storage and communication of private sensitive data pertaining to users’ lives, bring security concerns into the...
Conference Paper
Full-text available
The need to manage embedded systems, brought forward by the wider adoption of pervasive computing, is particularly vital in the context of secure and safety-critical applications. This work presents RT-SPDM, a framework for the real-time management of devices populating ambient environments. The proposed frame-work utilizes a formally validated app...
Conference Paper
Full-text available
In this paper we present a standalone hardware-implemented system that performs all signal processing stages necessary to classify the species of insects based on their wing-flap imprint as they fly. The recognizer classifies insect’s wing-beat recordings from an array of phototransistors receiving light from an infrared LED or laser. The wing-beat...
Article
Full-text available
Interconnected computing systems, in various forms, are expected to permeate our lives, realizing the vision of the Internet of Things (IoT) and allowing us to enjoy novel, enhanced services that promise to improve our everyday lives. Nevertheless, this new reality also introduces significant challenges in terms of performance, scaling, usability a...
Article
Full-text available
Ubiquitous devices comprising several resource-constrained nodes with sensors, actuators and networking capabilities, are becoming part of many solutions that seek to enhance user’s environment smartness and quality of living, prominently including enhanced healthcare services. In such an environment, security issues are of primary concern as a pot...
Article
Full-text available
Interconnected computing systems, in various forms, will soon permeate our lives, realizing the Internet of Things (IoT) and allowing us to enjoy novel, enhanced services that promise to improve our everyday life. Nevertheless, this new reality introduces significant challenges in terms of performance, scaling, usability and interoperability. Lever...
Article
Full-text available
The intelligence being built into various vehicle types, will not only improve their safety and comfort but also enable new modes of transportation and new types of services, creating the corresponding markets. In all cases, it will be important to be able to monitor, preferably in real-time, various parameters of the smart vehicles’ condition. Thi...
Article
Full-text available
Certain insects affect cultivations in a detrimental way. A notable case is the olive fruit fly (Bactrocera oleae (Rossi)), that in Europe alone causes billions of euros in crop-loss/per year. Pests can be controlled with aerial and ground bait pesticide sprays, the efficiency of which depends on knowing the time and location of insect infestations...
Article
Full-text available
Embedded systems security is a recurring theme in current research efforts, brought in the limelight by the wide adoption of ubiquitous devices. Significant funding has been allocated to various European projects on this subject area, in order to investigate and overcome the various security challenges. This paper provides an overview of recent EU...