Tom Karygiannis

Learn More
Numerous schemes have been proposed for secure routing protocols, and Intrusion Detection and Response Systems, for ad hoc networks. In this paper, we present a proof-of-concept implementation of a secure routing protocol based on AODV over IPv6, further reinforced by a routing protocol-independent Intrusion Detection and Response system for ad-hoc(More)
The adoption of wireless technologies and handheld devices is becoming widespread in business, industry, and government organizations. The use of handheld devices introduces new risks to existing enterprise computing resources. Therefore, organizations require new strategies to mitigate the security risks associated with the integration of wireless(More)
In the last decade, wireless communications and electronic devices have experienced an impressive growth. The use of the air as propagation medium has greatly attracted both users and industry due to the numerous advantages offered by this kind of communication. Nowadays, the use of our smart phone, tablet or netbook is becoming a core part of our daily(More)
  • 1