Skip to main content

Showing 1–7 of 7 results for author: Skaperas, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.10977  [pdf, ps, other

    cs.DC cs.NI

    An Open-Source Experimentation Framework for the Edge Cloud Continuum

    Authors: Georgios Koukis, Sotiris Skaperas, Ioanna Angeliki Kapetanidou, Vassilis Tsaoussidis, Lefteris Mamatas

    Abstract: The CODECO Experimentation Framework is an open-source solution designed for the rapid experimentation of Kubernetes-based edge cloud deployments. It adopts a microservice-based architecture and introduces innovative abstractions for (i) the holistic deployment of Kubernetes clusters and associated applications, starting from the VM allocation level; (ii) declarative cross-layer experiment configu… ▽ More

    Submitted 16 March, 2024; originally announced March 2024.

    Comments: To be published in IEEE INFOCOM CNERT Workshop

  2. arXiv:2403.10954  [pdf, other

    cs.DC cs.NI

    ClusterSlice: A Zero-touch Deployment Platform for the Edge Cloud Continuum

    Authors: Lefteris Mamatas, Sotiris Skaperas, Ilias Sakellariou

    Abstract: We demonstrate ClusterSlice, an open-source solution for automated Kubernetes-center deployments for the edge continuum. ClusterSlice is an infrastructure-as-a-service, platform-as-a-service, and application-as-a-service solution, supporting: (i) declarative deployment slice definitions; (ii) infrastructure-on-demand capabilities over multiple heterogeneous domains; (iii) composable Kubernetes dep… ▽ More

    Submitted 16 March, 2024; originally announced March 2024.

    Journal ref: 27th Conference on Innovation in Clouds, Internet and Networks (ICIN 2024), March 11-14, 2024, Paris, France, Demo Paper

  3. arXiv:2401.07717  [pdf, ps, other

    cs.NI

    A Pragmatical Approach to Anomaly Detection Evaluation in Edge Cloud Systems

    Authors: Sotiris Skaperas, George Koukis, Ioanna Angeliki Kapetanidou, Vassilis Tsaoussidis, Lefteris Mamatas

    Abstract: Anomaly detection (AD) has been recently employed in the context of edge cloud computing, e.g., for intrusion detection and identification of performance issues. However, state-of-the-art anomaly detection procedures do not systematically consider restrictions and performance requirements inherent to the edge, such as system responsiveness and resource consumption. In this paper, we attempt to inv… ▽ More

    Submitted 15 January, 2024; originally announced January 2024.

    Comments: Submitted: Proc. IEEE Int. Conf. Comput. Commun. ICCN Workshops (INFOCOM ICCN WKSHPS), Vancouver, Canada, 2024

  4. arXiv:2401.07674  [pdf, ps, other

    cs.NI

    Performance Evaluation of Kubernetes Networking Approaches across Constraint Edge Environments

    Authors: Georgios Koukis, Sotiris Skaperas, Ioanna Angeliki Kapetanidou, Lefteris Mamatas, Vassilis Tsaoussidis

    Abstract: Kubernetes (K8s) serves as a mature orchestration system for the seamless deployment and management of containerized applications spanning across cloud and edge environments. Since high-performance connectivity and minimal resource utilization become critical factors as we approach the edge, evaluating the performance of K8s networking in this context is essential. This paper contributes to this e… ▽ More

    Submitted 15 January, 2024; originally announced January 2024.

    Comments: Submitted: Proc. IEEE Int. Conf. Comput. Commun. ICCN Workshops (INFOCOM ICCN WKSHPS), Vancouver, Canada, 2024

  5. arXiv:2206.00332  [pdf, other

    eess.SP cs.CR cs.IT

    Smart Channel State Information Pre-processing for Joint Authentication and Secret Key Distillation

    Authors: Muralikrishnan Srinivasan, Sotiris Skaperas, Arsenia Chorti, Mahdi Shakiba Herfeh, Muhammad K. Shehzad, Philippe Sehier

    Abstract: While the literature on RF fingerprinting-based authentication and key distillation is vast, the two topics have customarily been studied separately. In this paper, starting from the observation that the wireless channel is a composite, deterministic / stochastic process, we propose a power domain decomposition that allows performing the two tasks simultaneously. We devise intelligent pre-processi… ▽ More

    Submitted 1 June, 2022; originally announced June 2022.

  6. arXiv:2110.15415  [pdf, other

    cs.IT cs.AI cs.CR

    On the Use of CSI for the Generation of RF Fingerprints and Secret Keys

    Authors: Muralikrishnan Srinivasan, Sotiris Skaperas, Arsenia Chorti

    Abstract: This paper presents a systematic approach to use channel state information for authentication and secret key distillation for physical layer security (PLS). We use popular machine learning (ML) methods and signal processing-based approaches to disentangle the large scale fading and be used as a source of uniqueness, from the small scale fading, to be treated as a source of shared entropy secret ke… ▽ More

    Submitted 28 October, 2021; originally announced October 2021.

  7. arXiv:2003.12027  [pdf, ps, other

    cs.CR cs.NI

    Denial of Service Attacks Detection in Software-Defined Wireless Sensor Networks

    Authors: Gustavo A. Nunez Segura, Sotiris Skaperas, Arsenia Chorti, Lefteris Mamatas, Cintia Borges Margi

    Abstract: Software-defined networking (SDN) is a promising technology to overcome many challenges in wireless sensor networks (WSN), particularly with respect to flexibility and reuse. Conversely, the centralization and the planes' separation turn SDNs vulnerable to new security threats in the general context of distributed denial of service (DDoS) attacks. State-of-the-art approaches to identify DDoS do no… ▽ More

    Submitted 26 March, 2020; originally announced March 2020.