Papers by Antonis Markopoulos

Higher layer security mechanisms in personal area network (PAN)
2004 IEEE 59th Vehicular Technology Conference. VTC 2004-Spring (IEEE Cat. No.04CH37514), 2004
ABSTRACT With communication networks becoming evermore an integral part of our daily lives, secur... more ABSTRACT With communication networks becoming evermore an integral part of our daily lives, securing the data exchanged on those networks is now more vital than ever. One of the latest promising next generation environments is the personal area network (PAN). To achieve a high degree of secure communication, security aspects need to be considered in all part and layers of such a system. While a high level overview of a complete system and the required security for this system is of utmost importance, security issues need to be considered in each part of the system separately as well. Each layer and component in a large system has its own security considerations in terms of possible attacks and requirements and needs in terms of security approaches to be used. To ease the introduction of PANs in different business models and applications, there is a need to identify vertical industries and applications that are relevant to the PAN environment and extrapolate today's security and privacy standards.
Editorial Note: Special Issue on Cellular and Wireless Location Based Technologies and Services (Guest Editors: Antonis Markopoulos, Patrick Eggers and Seshaiah Ponnekanti)
Wireless Personal Communications
Efficient Location-Based Hard Handoff Algorithms for Cellular Systems
Lecture Notes in Computer Science, 2004
N. Mitrou et al. (Eds.): NETWORKING 2004, LNCS 3042, pp. 476489, 2004. © IFIP International Fede... more N. Mitrou et al. (Eds.): NETWORKING 2004, LNCS 3042, pp. 476489, 2004. © IFIP International Federation for Information Processing 2004 ... Efficient Location-Based Hard Handoff Algorithms for Cellular Systems ... Antonis Markopoulos, Panagiotis Pissaris, Sofoklis Kyriazakos, ...

Increased handover performance in 2G and 3G wireless systems based on combined mobile-location and area
The 5th International Symposium on Wireless Personal Multimedia Communications, 2002
ABSTRACT Localization of mobile terminals is one of the hottest topics, both for service provider... more ABSTRACT Localization of mobile terminals is one of the hottest topics, both for service providers and cellular operators. A large number of value added services can be offered to the users, increasing subscriber satisfaction, on the other hand network performance should be guaranteed to support these applications. In existing cellular systems handover is one of the procedures that causes serious network shortcomings. This procedure is much more complicated in next generation systems (UMTS) and is of great interest for investigation and optimization. We present a method of exploiting user's location in order to assist the handover procedure, minimizing the failure probability and the signaling overhead. Our main concern is to provide a mechanism transparent from the location server and increase network performance and stability.
Optimized handover procedure based on mobile location in cellular systems
14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003., 2003
Future-generation mobile communications will provide broadband multimedia services to users, anyw... more Future-generation mobile communications will provide broadband multimedia services to users, anywhere and anytime. On the other hand network performance should be guaranteed to support these applications and services. In existing cellular systems handover is one of the procedures that causes serious network shortcomings. This procedure is much more complicated in next generation systems (UMTS) and is of great interest for
Wireless Personal …, Jan 1, 2004

Security mechanisms maintaining user profile in a personal area network
14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003., 2003
ABSTRACT A personal area network environment is a wireless ad hoc data communication system that ... more ABSTRACT A personal area network environment is a wireless ad hoc data communication system that allows a number of independent data devices to communicate. A more and more wireless devices will be used in the near future. These devices form an ad-hoc environment whose security issues are very critical. The robustness and adaptability will become the key issues to accomplish security in ad hoc wireless network. Security should be applied in all levels of the system, but main concern of this paper is to tackle this issue mainly by means of secure communication in higher layers and how it could be possible to maintain the user profile and share specific services and application with other PANs. There is a need of enhanced security via application in order to achieve seamless communication between several devices not only over the same personal area network. Some desirable properties such as authentication and privacy that can prevent the information of the users from flowing to others is considered through this application.

Wireless Personal Communications, 2004
The concept of being always online, regardless of the time and place, has been one of the hot top... more The concept of being always online, regardless of the time and place, has been one of the hot topics in the commercial and scientific forums during the last years. The term itself is not solidly defined, however it is often used to refer to user's ability to get the same services via changing variety of underlying networks. In order to really work, this kind of multiaccess in heterogeneous networks still requires research, technological achievements and even compromises. The key to successfully implement the multiaccess is vertical handover that allows the application services to be seamlessly transferred between different networks. Juuso Pesola was born in Oulu, Finland on March 1971. He has studied Computer Science in Helsinki University and Electrical and Communications Engineering in Helsinki University of Technology. In his studies he has focused on telecommunication protocols and telecommunications software. Mr. Pesola has been working for VTT Information Technology since 1996. During his career and studies, he has been participating in several national and international research projects, including several ACTS and IST projects, e.g. CELLO (Cellular network optimization based on mobile location) MAGNET (My Personal Adaptive NET). In addition, he has been working in several projects developing communication software for telecommunication industry. He has published several papers. Mr. Pesola's special interest areas are embedded communication systems and platforms, security of communication systems, mobility in IP Networks, and mobile applications and services.
Wireless Personal Communications, 2007
This paper presents a technique which is based on pattern recognition techniques, in order to est... more This paper presents a technique which is based on pattern recognition techniques, in order to estimate Mobile Terminal (MT) velocity. The proposed technique applies on received signal strength (RSS) measurements and more precisely on information extracted from Iub air interface, in wideband code-division multiple access (WCDMA) systems for transmission control purposes. Pattern recognition is performed by Hidden Markov Model (HMM), which is trained with downlink signal strength measurements for specific areas, employing Clustering LARge Applications (CLARA) like a clustering method. Accurate results from a single probe vehicle show the potential of the method, when applied to large scale of MTs.

Radio resource management is one of the most challenging issues in wireless systems of present an... more Radio resource management is one of the most challenging issues in wireless systems of present and future generation. Lack of bandwidth, increased number of subscribers and high data-rate services, often cause congestion situations in wireless systems. One of the main concerns of cellular operators is to adopt intelligent mechanisms to overcome these network shortcomings. To achieve this, an efficient traffic monitoring is required. Position location of mobile terminals is one of the means to combine measurements performed by the users and their location, resulting in a monitoring system, which consists of databases with a set of network performance indicators. This information can be exploited in a way to predict traffic overload and reconfigure the system on-the-fly. In this paper we tackle the issue of resource management and we describe an adaptive coverage system that is capable to adjust radio resources in an efficient way for the network. Our main concern is to show the poten...

IST Summit, 2002
Position location of mobile terminals is one of the most challenging issues nowadays. Apart from ... more Position location of mobile terminals is one of the most challenging issues nowadays. Apart from the large number of value added services that can be offered to the users, network support is one of the most useful applications for the cellular operators. The information used for positioning can be evaluated locally, so that the operator can enhance the network's performance without requiring user related information. In existing cellular systems one of the procedures that seems to cause serious network shortcomings is handover. This procedure is much more complicated in next generation systems (UMTS) and is of great interest for investigation and optimization. In this paper we have presented the structure of the LAH simulator. This simulator is a powerful platform to study cellular network procedures that are strongly related with the user location. This simulation platform will be used to prove the add-on of localization to the handover procedure.
5th European …, Jan 1, 2004
2004 IEEE 59th Vehicular …, Jan 1, 2004
Uploads
Papers by Antonis Markopoulos