International Joint Conference on e-Business and Telecommunications
ICETE 2010 – International Joint Conference on e-Business and Telecommunications: July 26-28, Athens, Greece
July 26-28     Athens, Greece
Keynote Speakers

ICETE is a joint conference composed of six concurrent conferences: DCNET, ICE-B, OPTICS, SECRYPT, SIGMAP and WINSYS.
The six conferences are always co-located and held in parallel.
Keynote lectures are plenary sessions and can be attended by all ICETE participants.


Ian F. Akyildiz, Georgia Institute of Technology, U.S.A.
          Title: Nanonetworks: A New Frontier in Communications

Petar M. Djuric, Stony Brook University, U.S.A.
          Title: From Nature to Methods and Back to Nature

Stamatios Kartalopoulos, University of Oklahoma, U.S.A.
          Title: Chaotic Quantum Cryptography: The Ultimate for Network Security

Nikolaos Bourbakis, Wright State University, U.S.A.
          Title: Information Security: The SCAN – Secure Processor with Crypto-Biometrics Capabilities


Keynote Lecture 1
Nanonetworks: A New Frontier in Communications
Ian F. Akyildiz
Georgia Institute of Technology

Brief Bio
Ian F. Akyildiz received his BS, MS, and PhD degrees in Computer Engineering from the University of Erlangen-Nuremberg, Germany, in 1978, 1981 and 1984, respectively. Currently, he is the Ken Byers Distinguished Chair Professor with the School of Electrical and Computer Engineering, Georgia Institute of Technology, Director of Broadband Wireless Networking Laboratory and Chair of the Telecommunication Group at Georgia Tech.

Dr. Akyildiz is also an Honorary Professor with the School of Electrical Engineering at the Universitat Politècnica de Catalunya, Barcelona, Spain, since June 2008. Also since March 2009, he is an Honorary Professor with the Department of Electrical, Electronic and Computer Engineering at the University of Pretoria, South Africa.

He is the Editor-in-Chief of Computer Networks (Elsevier) Journal, the founding Editor-in-Chief of the Ad Hoc Networks Journal (Elsevier) in 2003, the founding Editor-in-Chief of the Physical Communication (PHYCOM) Journal (Elsevier) in 2008, and the founding Editor-in-Chief of Nano Communication Networks (NANO-COMNET) Journal (Elsevier) in 2010. Dr. Akyildiz serves on the advisory boards of several research centers, journals, conferences and publication companies.

Dr. Akyildiz is an IEEE Fellow (1996) and an ACM Fellow (1997). He received numerous awards from IEEE and ACM. His current research interests are in Nanonetworks, Cognitive Radio Networks, and Wireless Sensor Networks.

Nanotechnology is enabling the development of devices in a scale ranging from one to a few one hundred nanometers. Nanonetworks, i.e., the interconnection of nano-scale devices, are expected to expand the capabilities of single nano-machines by allowing them to cooperate and share information. Traditional communication technologies are not directly suitable for nanonetworks mainly due to the size and power consumption of existing transmitters, receivers and additional processing components. All these define a new communication paradigm that demands novel solutions such as nano-transceivers, channel models for the nano-scale, and protocols and architectures for nanonetworks. In this talk, first the state-of-the-art in nano-machines, including architectural aspects, expected features of future nano-machines, and current developments are presented for a better understanding of the nanonetwork scenarios. Moreover, nanonetworks features and components are explained and compared with traditional communication networks. Novel nano-antennas based on nano-materials as well as the terahertz band are investigated for electromagnetic communication in nanonetworks. Furthermore, molecular communication mechanisms are presented for short-range networking based on ion signaling and molecular motors, for medium-range networking based on flagellated bacteria and nanorods, as well as for long-range networking based on pheromones and capillaries. Finally, open research challenges such as the development of network components, molecular communication theory, and new architectures and protocols, which need to be solved in order to pave the way for the development and deployment of nanonetworks within the next couple of decades are presented.


Keynote Lecture 2
From Nature to Methods and Back to Nature
Petar M. Djuric
Stony Brook University

Brief Bio
Petar M. Djurić received his B.S. and M.S. degrees in electrical engineering from the University of Belgrade, in 1981 and 1986, respectively, and his Ph.D. degree in electrical engineering from the University of Rhode Island, in 1990. From 1981 to 1986 he was a Research Associate with the Institute of Nuclear Sciences, Vinča, Belgrade. Since 1990 he has been with Stony Brook University, where he is Professor in the Department of Electrical and Computer Engineering. He works in the area of statistical signal processing, and his primary interests are in the theory of signal modeling, detection, and estimation and application of the theory to a wide range of disciplines. Prof. Djurić has been invited to lecture at universities in the United States and overseas and has served on numerous committees for the IEEE. During 2008-2009 he was Distinguished Lecturer of the IEEE Signal Processing Society. He was the Area Editor for Special Issues of the Signal Processing Magazine and Associate Editor of the IEEE Transactions on Signal Processing. He has also been on the Editorial Boards of many IEEE and EURASIP professional journals. In 2007, he received the IEEE Signal Processing Magazine Best Paper Award. Prof. Djurić is a Fellow of IEEE.

A fundamental challenge in today's arena of complex systems is the design and development of accurate and robust signal processing methods. These methods should be capable to adapt quickly to unexpected changes in the data and operate under minimal model assumptions. Systems in Nature also do signal processing and often do it optimally. Therefore, it makes much sense to understand what Nature does and try to mimic it and do even better. In return, the results of better signal processing methods may lead to new advancements in science and technology and in understanding Nature. In this presentation methods for signal processing that borrow concepts and principles found in Nature are addressed including ant optimization, swarm intelligence and genetic algorithms. However, the emphasis of the presentation is on Monte Carlo-based methods, and in particular, methods related to particle filtering, cost-reference particle filtering, and population Monte Carlo. In the past decade and a half, Monte Carlo-based methods have gained considerable popularity in dealing with nonlinear and/or non-Gaussian systems. The three groups of methods share the feature that they explore spaces of unknowns using particles and weights (costs) assigned to the particles. In most versions of these methods, particles move independently and in accordance with the dynamics of the assumed model of the states. Interactions among particles only occur through the process of resampling rather than through local interactions as is common in physical and biological systems. Such interactions can improve the performance of the methods and can allow for coping with more challenging problems with better efficiency and accuracy. We show how we apply these methods to problems in engineering, economics, and biology.


Keynote Lecture 3
Chaotic Quantum Cryptography: The Ultimate for Network Security
Stamatios Kartalopoulos
University of Oklahoma

Brief Bio
Stamatios V. Kartalopoulos, PhD, is currently the Williams Professor in Telecommunications Networking at the University of Oklahoma. His research emphasis is on optical communication networks (FSO, long haul, and FTTH), optical technology including optical metamaterials, and optical communications security including chaos, quantum cryptography and key distribution. Prior to this, he was with Bell Laboratories where he defined, led and managed research and development teams in the areas of DWDM networks, SONET/SDH and ATM, Cross-connects, Switching, Transmission and Access systems. He has received the President’s Award and many awards of Excellence.

He holds nineteen patents in communications networks and has authored more than two hundred scientific papers, nine reference textbooks in advanced fiber optic communications and security, and has also contributed several chapters to other books.

He has been an IEEE and a Lucent Technologies Distinguished Lecturer and has lectured at international Universities, at NASA, conferences and research forums. He has been keynote speaker of major international conferences, has moderated executive forums, has been a panelist of interdisciplinary topics, and has organized symposia, workshops and sessions at major international communications conferences.

Dr Kartalopoulos is an IEEE Fellow, chair and founder of the IEEE ComSoc Communications & Information Security Technical Committee, board member of IEEE Potentials magazine, IEEE Press/Wiley Series editor, member at large of IEEE New Technologies Directions Committee, and has served editor-in-chief of IEEE Press, chair of ComSoc Emerging Technologies and of SPCE Technical Committees, Area-editor of IEEE Communications Magazine/Optical Communications, member of IEEE PSPB, and VP of IEEE Computational Intelligence Society.

As the sophistication of intruders’ increases, so does the incidents of information integrity breaches and network attacks. In response, very complex cryptographic processes have started being employed, such as chaos theory and quantum theory, in an effort to create the “holy grail” of cryptographic systems and network security.
Quantum theory defines the non-classical qubit, which is the superposition of quantum states having no classical analog. It is also based on the “no cloning” and “no copying” theorem and on the Heisenberg’s uncertainty. The quanto-mechanical properties of photons and the quantum mechanics provide a superb platform for communications security and particularly in secure optical communication networks, known as quantum cryptography and quantum networks, respectively.
Chaos is based on the particular behavior of certain non-linear functions, which for a minute change of parameters produce a huge and unstable output, known as the “chaotic regime”. However, this chaos can be reproducible, which makes it attractive to secure communications. Thus, the combined Chaos and Quantum theories play a synergistic role in the quest for the “holy grail” in communications security.
In this talk we explain with simple examples quantum cryptography and protocols, as well as chaos and chaotic processes. We also describe the synergy of chaos and quantum theories as well as the increased efficiency and speed of the quantum key establishment.


Keynote Lecture 4
Information Security: The SCAN – Secure Processor with Crypto-Biometrics Capabilities
Nikolaos Bourbakis
Wright State University

Brief Bio
Dr. Nikolaos Bourbakis (IEEE Fellow) is an OBR Distinguished Professor of IT and the Director of the Assistive Technologies Research Center (ATRC) at Wright State University, OH. He pursues research in Applied AI, Machine Vision, Bioinformatics & Bioengineering, Assistive Technologies, Information Security, and Parallel- Distributed Processing funded by USA and European government and industry. He has published more than 330 articles in refereed International Journals, book-chapters and Conference Proceedings, and 10 books as an author, co-author or editor. He has graduated 17Ph.Ds and 37 Master students. He is the founder and the EIC of the International Journal on AI Tools, the Editor-in-Charge of a Research Series of Books in AI (WS Publisher), the Founder and General Chair of several International IEEE Computer Society Conferences, Symposia and Workshops, an Associate Editor in several IEEE and International Journals and a Guest Editor in 18 journals special issues. His research work has been internationally recognized and has won several prestigious awards. Some of them are: IBM Author recognition Award 1991, IEEE Computer Society Outstanding Contribution Award 1992, IEEE Outstanding Paper Award ATC 1994, IEEE Computer Society Technical Research Achievement Award 1998, IEEE ICTAI 10 years Research Contribution Award 1999, IEEE Symposium on BIBE Outstanding Leadership Award 2003, ASC Award for Assistive Technology 2005, University of Patras Degree of Recognition 2007.

Secure computing is gaining importance in recent times as computing capability is increasingly becoming distributed and information is everywhere. Prevention of piracy and digital rights management has become very important. Information security is mandatory rather than an additional feature. Numerous software techniques have been proposed to provide certain level of copyright and intellectual property protection. Techniques like obfuscation attempts to transform the code into a form that is harder to reverse engineer. Tamper-proofing causes a program to malfunction when it detects that it has been modified. Software watermarking embeds copyright notice in the software code to allow the owners of the software to assert their intellectual property rights. The software techniques discourage software theft, can trace piracy, prove ownership, but cannot prevent copying itself. Thus, software based security firewalls and encryption is not completely safe from determined hackers. This necessitates the need for information security at the hardware level, where secure processors assume importance.
In this talk the SCAN-Secure Processor is presented as a possible solution to these important issues mentioned above. The SCAN-SP is a modified Sparc V8 processor architecture with a new instruction set to handle image compression, encryption, information hiding and biometric authentication. A SCAN based methodology for encryption and decryption of 32 bit instructions and data and a Local-Global graph based methodology for biometric authentication is presented. The modules to support the new instructions are synthesized in reconfigurable logic and the results of FPGA synthesis are presented. The ultimate goal of the presented work is the tradeoffs that exists between speed of execution and security of the processor. Designing a faster processor is not the goal of the presented work, rather exploring the architecture to provide security is of prime importance.