Helen C. Leligou

ORCID: 0000-0002-1489-1495
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Optical Network Technologies
  • Advanced Photonic Communication Systems
  • Optical Network Technologies
  • Energy Efficient Wireless Sensor Networks
  • IoT and Edge/Fog Computing
  • Mobile Ad Hoc Networks
  • Security in Wireless Sensor Networks
  • Blockchain Technology Applications and Security
  • Software-Defined Networks and 5G
  • Network Traffic and Congestion Control
  • Power Line Communications and Noise
  • Cloud Computing and Resource Management
  • Software System Performance and Reliability
  • Opportunistic and Delay-Tolerant Networks
  • Smart Grid Security and Resilience
  • Vehicular Ad Hoc Networks (VANETs)
  • Indoor and Outdoor Localization Technologies
  • Network Security and Intrusion Detection
  • Interconnection Networks and Systems
  • Energy Harvesting in Wireless Networks
  • Bluetooth and Wireless Communication Technologies
  • Advanced Wireless Communication Technologies
  • Context-Aware Activity Recognition Systems
  • Advanced Malware Detection Techniques
  • Wireless Communication Networks Research

University of West Attica
2018-2025

Synelixis (Greece)
2017-2024

Lakka (Finland)
2023

Hellenic Open University
2022

INTRASOFT International (Luxembourg)
2020-2021

Exelixis (United States)
2020

Technological Educational Institute of Central Greece
2008-2018

Technological Educational Institute of Thessaly
2015-2017

Teledyne Princeton Instruments (United States)
2016

University of Peloponnese
2008-2009

In this paper, promising technologies and a network architecture are presented for future optical packet switched networks. The overall concept is the major choices highlighted compared with alternative solutions. Both long shorter term approaches considered, as well both wide-area multiple-area networks parts of network. results in paper were developed frame research project DAVID (Data And Voice Integration over DWDM) project, funded by European Commission through IST-framework.

10.1109/jsac.2003.816388 article EN IEEE Journal on Selected Areas in Communications 2003-09-01

Abstract The range of applications wireless sensor networks is so wide that it tends to invade our every day life. In the future, a network will survey health, home, roads we follow, office or industry work in even aircrafts use, an attempt enhance safety. However, themselves are prone security attacks. list attacks, although already very long, continues augment impeding expansion these networks. trust management schemes consist powerful tool for detection unexpected node behaviours (either...

10.1002/ett.1413 article EN European Transactions on Telecommunications 2010-04-08

The digitization of manufacturing industry has led to leaner and more efficient production, under the Industry 4.0 concept. Nowadays, datasets collected from shop floor assets information technology (IT) systems are used in data-driven analytics efforts support informed business intelligence decisions. However, these results currently only isolated dispersed parts production process. At same time, full integration artificial (AI) all is lacking. In this context, goal manuscript present a...

10.3390/s20195480 article EN cc-by Sensors 2020-09-24

The European Union has set targets to reduce the greenhouse gases emissions in total energy consumption as a part of securing clean initiative and efforts carbon reductions 90%, compared 1990 ones, until 2050. transport sector is particularly exacerbating above problems. Focusing on their fight, authorities have invested continue invest electric propulsion. In Union, mobility grown tremendously last decade. Specifically, more automobile industries are turning interest technology replace...

10.1016/j.egyr.2020.09.025 article EN cc-by Energy Reports 2020-11-01

The diversity of applications that current and emerging Wireless Sensor Networks (WSNs) are called to support imposes different requirements on the underlying network with respect delay loss, while at same time WSN its own intricacies. satisfaction these highly depends metric upon which forwarding routes decided. In this view, IETF ROLL group has proposed RPL routing protocol, can flexibly work various metrics, as long they hold specific properties. system implementer/user is free decide...

10.1109/temu.2012.6294705 article EN 2012-07-01

5G is considered to be the technology that will accommodate development and management of innovative services with stringent diverse requirements from end users, calling for new business models industry. In this context, efficient Network Services (NS) serving specific vertical industries spanning across multiple administrative domains heterogeneous infrastructures challenging. The main challenges regard provision NSs considering Quality Service (QoS) per industry along optimal usage...

10.3390/jsan9010004 article EN cc-by Journal of Sensor and Actuator Networks 2020-01-04

The standardization of passive optical networks capable transporting Ethernet frames at gigabit-per-second speeds, currently in progress both ITU-T and IEEE, constitutes a major milestone toward cost-effective photonization the last (aka first) mile. article presents an gigabit PON (GPON) system aligned with philosophy evolving FSAN (full service access network) specification, which focuses on efficient support any level quality service. intelligence this system, terms traffic guarantees,...

10.1109/mcom.2003.1267106 article EN IEEE Communications Magazine 2004-02-01

The energy sector represents undoubtedly one of the most significant "test cases" for 5G enabling technologies, due to need addressing a huge range very diverse requirements deal with across variety applications (stringent capacity smart metering/AMI versus latency supervisory control and fault localization).However, effectively support utilities along their transition towards more decentralized renewable-oriented systems, several open issues still remain as networks management automation,...

10.1109/percomw.2018.8480296 article EN 2018-03-01

Blockchain technology can have numerous applications in the shipping industry (although it is a newcomer blockchain technology) as provides transparency, security, and cost reduction financial transactions. Although at its early steps, this has been applied industry. The majority of related literature deals with applicability various processes company supply chains. Instead, paper focuses on willingness companies to adopt through an exploratory survey. It develops framework based slightly...

10.1016/j.martra.2022.100058 article EN cc-by-nc-nd Maritime Transport Research 2022-01-01

The advancement and acceptance of new technologies often hinges on the level understanding trust among potential users. Blockchain technology, despite its broad applications across diverse sectors, is met with skepticism due to a general lack incidents illicit activities in cryptocurrency domain. This study aims demystify blockchain technology by providing an in-depth examination application novel blockchain-based card game, centered around renewable energy sustainable resource management....

10.3390/computers13010014 article EN cc-by Computers 2024-01-03

Abstract The steadily rising demand for multimedia and data services, the falling cost omnipresence of Ethernet maturity passive optical networks (PON) technology, promise to radically change landscape in local loop. heart a gigabit PON system (recently standardized by FSAN/ITU) is medium access controller (MAC), which arbitrates upstream link among users with fluctuating traffic demands effects multiplexing concentration policy. At same time, it has safeguard service quality enforce...

10.1002/dac.761 article EN International Journal of Communication Systems 2005-11-14

The majority of research and development efforts in the area Wireless Sensor Networks (WSNs) focus on WSN systems that are dedicated for a specific application. However, this trend is currently being replaced by resource-rich deployments expected to provide capabilities excess any application's requirements. In regard, concept virtual sensor networking an emerging approach enables decoupling physical deployment from applications running top it, allowing way dynamic collaboration subset nodes...

10.1186/1687-1499-2012-135 article EN cc-by EURASIP Journal on Wireless Communications and Networking 2012-04-06

The potential of Federated Learning (FL) deployment increases rapidly as the number connected devices increases, value artificial intelligence is recognized and networking technologies edge computing evolves. However, in any distributed system, a set security issues arise FL systems. In this paper, we discuss use blockchain technology to address diverse aspects systems focus on model poisoning attack for which propose novel Blockchain-based defense scheme. An assessment using data from MNIST...

10.1109/compsac48688.2020.00-96 article EN 2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC) 2020-07-01

Modern supply chains comprise an increasing number of actors which deploy different information technology systems that capture a diverse nature and sources (from sensors to order information). While the benefits automatic exchange between these have been recognized led their interconnection, protecting whole chain from potential attacks is challenging issue given attack proliferation reported in literature. In this paper, we present FISHY platform, anticipates by (a) adopting novel...

10.3390/electronics13010215 article EN Electronics 2024-01-03

The domain of Wireless Sensor Networks (WSNs) applications is increasing widely over the last few years.As this new type networking characterized by severely constrained node resources, limited network resources and requirement to operate in an ad hoc manner, implementing security functionality protect against adversary nodes becomes a challenging task.In paper, we present trust-aware, location-based routing protocol which protects WSN attacks, also supports large-scale WSNs deployments.The...

10.5121/ijnsa.2010.2304 article EN International Journal of Network Security & Its Applications 2010-07-09

With the advent of Software Defined Networking (SDN) and Network Function Virtualization (NFV) technologies, networking infrastructures are becoming increasingly agile in their attempts to offer quality services needed by users, maximizing efficiency infrastructure utilization. This essence mandates statistical multiplexing demands across different Providers (NPs), which would allow them cope with increasing demand, upgrading at a slower pace. However, enjoy benefits multiplexing, trusted...

10.3390/info11120570 article EN cc-by Information 2020-12-06

Abstract Wastes contain large quantities of energy that can be extracted using a variety methods. European Union has established waste‐to‐energy initiative to minimize waste and increase recovery. Τhe EU Landfill Directive promotes more environmental friendly management options. Accordingly, member states are adopting mechanical‐biological treatment processes, bio‐methanization waste‐derived fuels. Furthermore, is energy‐dependent, as its resources insufficient meet rising demands, fossil...

10.1049/rpg2.12315 article EN IET Renewable Power Generation 2021-10-26

Neural Style Transfer (NST) is a popular technique of computer vision where the content an image blended with style another, which results in fused certain properties both original images. This approach has practical applications various domains and garnered significant attention industry academia. An interesting application this segmented transfer segmentation algorithm used to locate objects within then method performed locally, producing images different styles for objects. opens up...

10.1109/access.2023.3315235 article EN cc-by-nc-nd IEEE Access 2023-01-01

ABSTRACT As the applications of wireless sensor networks proliferate, efficiency in supporting large and offering security guarantees becomes an important requirement design relevant networking protocols. Geographical routing has been proven to efficiently cope with network dimensions while trust management schemes have shown assist defending against attacks. Once information is available for all nodes, decisions can take it into account, i.e. be based on both location attributes. In this...

10.1002/wcm.1038 article EN Wireless Communications and Mobile Computing 2010-12-28

This paper presents a proposal for extending an existing terabit-class backbone network architecture to enable the use of LiFi technology by power utilities and smart cities. The proposed provides practical means integrating three grid communication technologies—fiber optics, BPL networks LED street lighting networks—across transmission distribution grids In addition expanding communications architecture, comprehensive overview analyzes concept in city. analytical investigation operation...

10.3390/su16020686 article EN Sustainability 2024-01-12
Coming Soon ...