Ioannis Papapanagiotou

ORCID: 0000-0003-0907-2580
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cloud Computing and Resource Management
  • IoT and Edge/Fog Computing
  • Advanced Wireless Network Optimization
  • Indoor and Outdoor Localization Technologies
  • Caching and Content Delivery
  • Wireless Networks and Protocols
  • Advanced Data Storage Technologies
  • Green IT and Sustainability
  • Mobile Ad Hoc Networks
  • Advanced MIMO Systems Optimization
  • Bluetooth and Wireless Communication Technologies
  • IPv6, Mobility, Handover, Networks, Security
  • Blockchain Technology Applications and Security
  • Context-Aware Activity Recognition Systems
  • Cloud Data Security Solutions
  • Software System Performance and Reliability
  • Network Traffic and Congestion Control
  • Advanced Authentication Protocols Security
  • Software-Defined Networks and 5G
  • Internet Traffic Analysis and Secure E-voting
  • Network Security and Intrusion Detection
  • Electric Vehicles and Infrastructure
  • Peer-to-Peer Network Technologies
  • Fault Detection and Control Systems
  • Energy Efficient Wireless Sensor Networks

University of Piraeus
2023-2024

Capgemini (Netherlands)
2022

Netflix (United States)
2016-2018

Purdue University West Lafayette
1983-2018

North Carolina State University
2007-2018

University of Patras
2006-2007

Micro-location is the process of locating any entity with high accuracy (possibly in centimeters), while geofencing creating a virtual fence around so-called Point Interest (PoI). In this paper, we present an insight into various micro-location enabling technologies and services. We also discuss how these can accelerate incorporation Internet Things (IoT) smart buildings. argue that based location-aware solutions play significant role facilitating tenants IoT equipped building. Also, such...

10.1109/jiot.2015.2442956 article EN IEEE Internet of Things Journal 2015-06-09

The Internet of Things (IoT) is intended for ubiquitous connectivity among different entities or "things". While its purpose to provide effective and efficient solutions, security the devices network a challenging issue. number connected along with ad-hoc nature system further exacerbates situation. Therefore, privacy has emerged as significant challenge IoT. In this paper,we aim thorough survey related challenges This document addresses these from perspective technologies architecture used....

10.1080/19393555.2018.1458258 article EN Information Security Journal A Global Perspective 2018-04-04

Electric vehicles (EVs) are becoming a more attractive transportation option, as they offer great cost savings, decrease foreign oil dependency, and reduce carbon emissions. However, varying temporal spatial demand patterns of EVs threatens power grid operations its physical components. Thus, the ability to handle potential extra load has become major factor in mainstream success. In order for this integration occur seamlessly, consumers need be coordinated harmony. paper, we address...

10.1186/1687-1499-2014-223 article EN cc-by EURASIP Journal on Wireless Communications and Networking 2014-12-01

In order to meet the requirements of 4G mobile networks targeted by cellular layer IMT-advanced, next generation WiMAX devices based on IEEE 802.16m will incorporate sophisticated signal processing, seamless handover functionalities between heterogeneous technologies and advanced mobility mechanisms. This survey provides a description key projected features physical (PHY) medium access control (MAC) layers 802.16m, as major candidate for providing aggregate rates at range Gbps high-speed...

10.1109/surv.2009.090402 article EN IEEE Communications Surveys & Tutorials 2009-01-01

The advent of Bluetooth Low Energy (BLE) enabled Beacons is poised to revolutionize the indoor contextual aware services users. Due lower energy consumption and higher throughput, BLE could therefore be an integral pillar Internet Things (IoT) Location Based Service (LBS). Tracking a user with high accuracy known as Micro-Location. This requirement many IoT user-centric applications for environments. Although several technologies have been used tracking purposes, has always serious issue. At...

10.1109/glocom.2015.7417504 article EN 2015 IEEE Global Communications Conference (GLOBECOM) 2015-12-01

Microlocation plays a key role in the transformation of traditional buildings into smart infrastructure. is process locating any entity with very high accuracy, possibly centimeters. Such technologies require detection energy efficiency, wide reception range, low cost, and availability. In this article, we provide insights various microlocation-enabling technologies, techniques, services discuss how they can accelerate incorporation Internet Things (IoT) buildings. We cover challenges...

10.1109/msp.2018.2846804 article EN IEEE Signal Processing Magazine 2018-09-01

To facilitate the adoption of electric vehicles (EVs) and their plug-in hybrid (PHEVs) counterparts to avoid straining capacity power grid there is a strong need for developing network fast charging facilities coordinate service. Incorporation EVs in vehicle fleet would decrease green house gas emissions overall dependency on fossil fuels. A key issue that corresponding time fairly large, which can lead very long delays. Hence, stations provide good quality service customers, we first...

10.1109/glocom.2013.6831496 article EN 2015 IEEE Global Communications Conference (GLOBECOM) 2013-12-01

The accelerated evolution of Internet Things (IoT) architectures and their incorporation in vehicles, buildings, or cities provide the ideal environment for development optimization smart services. Under this light, positioning services that harvest location fingerprinting based on received signal strength indications (RSSIs) are widely popular due to massive data generation IoT settings provide. However, labor-intensive repetitive task radio map construction through offline RSSI fingerprint...

10.1109/jiot.2018.2810808 article EN IEEE Internet of Things Journal 2018-03-01

Proximity-based Services (PBS) require high detection accuracy, energy efficiency, wide reception range, low cost and availability. However, most existing technologies cannot satisfy all these requirements. Apple's Bluetooth Low Energy (BLE), named iBeacon, has emerged as a leading candidate in this domain become an almost industry standard for PBS. it several limitations. It suffers from poor proximity accuracy due to its reliance on Received Signal Strength Indicator (RSSI). To improve of...

10.1109/icc.2017.7996508 article EN 2017-05-01

The secure and efficient operation of time-critical networks, such as vehicular smart-grid, other smart-infrastructures, is primary importance in today's society. It crucial to minimize the impact security mechanisms over networks so that safe reliable operations systems are not being interfered. For instance, if delay introduced by crypto negatively affects time available for braking a car before collision, may be able safely stop time. In particular, authentication mechanism, existing...

10.1109/tifs.2017.2716911 article EN publisher-specific-oa IEEE Transactions on Information Forensics and Security 2017-06-19

Indoor localization can provide a number of different services such as location-aware advertisement, indoor navigation and automating appliances based on the user location. A techniques time-difference- of-arrival, angle-of-arrival, time-of-flight, received signal strength indicator (RSSI) have been used to Location Based Services (LBS). RSSI is one widely methods it cost efficient easy implement. However, RSSI's performance limited by multipath fading noise. Particle Filter (PF) an accurate...

10.1109/icc.2018.8423012 article EN 2018-05-01

Modern vehicles are being equipped with advanced sensing and communication technologies, which enable them to connect surrounding entities. In military vehicular networks, it is vital prevent adversaries from manipulating critical messages via cryptographic protection (e.g., digital signatures) at the same time minimize impact introduced by crypto operations delay). Hence, their must be delay-aware, scalable secure. this paper, we developed Hardware-Accelerated Authentication (HAA) that...

10.1109/milcom.2015.7357624 article EN 2015-10-01

The IEEE 802.11 protocol is the dominant standard for wireless local area networks (WLANs) and has generated much interests in investigating improving its performance. medium access control (MAC) mainly based on distributed coordination function (DCF). DCF uses a carrier sense multiple with collision avoidance (CSMA/CA) order to resolve contention between stations verify successful transmissions. In this paper we present an extensive investigation of performance 802.11b MAC protocol, respect...

10.1109/icimp.2007.29 article EN 2007-07-01

The Dynamic Host Configuration Protocol (DHCP) was introduced nearly 20 years ago as a mechanism for hosts to automatically acquire IP addresses. While the protocol remains same, its usage has evolved, especially in last decade with introduction of mobile devices and wireless local area networks. In this paper we investigate impact that new types devices, such smartphones, have on DHCP. We use two one-month long traces, collected at corporate an educational network, compare side-by-side DHCP...

10.1145/2398776.2398814 article EN 2012-11-14

In this work we present the differences and similarities of web browsing behavior in most common mobile platforms. We devise a novel Operating System (OS) fingerprinting methodology to distinguish different types wireless devices (smartphone vs laptops) as well operating system instances (iOS, Android, BlackBerry etc.). showcase that multimedia content smartphone is delivered via Range-Requests, large portion video transfers are aborted. also show laptop have more intelligent browser caching...

10.1145/2254756.2254824 article EN 2012-06-11

Software Defined Storage (SDS) separates the control layer from data allowing automation of management and deployment Commercial Off-The-Shelf (COTS) storage media rather than expensive traditional hardware-based solutions. Cloud block services lack an SDS framework that allows customization storage, policy enforcement, automate provisioning, management. decreases human intervention improves resource utilization. Moreover, cloud tenants to define customized functionalities based on their...

10.1109/cloud.2017.60 article EN 2017-06-01

A new medium access control (MAC) protocol is proposed for quality-of-service (QoS) support in wireless local area networks (WLAN). The an alternative to the recent enhancement 802.11e. priority policy provides system with better performance by simulating time division multiple (TDMA) functionality. Collisions are reduced and starvation of low-priority classes prevented a distributed admission algorithm. model found analytically extending previous work on this matter. results show that...

10.1155/wcn/2006/65836 article EN cc-by EURASIP Journal on Wireless Communications and Networking 2006-03-19

Traffic classification has become a crucial domain of research due to the rise in applications that are either encrypted or tend change port consecutively. The challenge flow is determine involved without any information on payload. In this paper, our goal achieve robust and reliable using data mining techniques. We propose model which not only classifies traffic, but also performs behavior pattern profiling. implemented by clustering algorithms, association rules derived "Apriori"...

10.1109/camad.2010.5686959 article EN 2010-12-01

An increasing number of technology enterprises are adopting cloud-native architectures to offer their web-based products, by moving away from privately-owned data-centers and relying exclusively on cloud service providers. As a result, vendors have lately increased, along with the estimated annual revenue they share. However, in process selecting provider's over competition, we observe lack universal common ground terms terminology, functionality services billing models. This is an important...

10.48550/arxiv.1710.01476 preprint EN other-oa arXiv (Cornell University) 2017-01-01

The BLEBeacon dataset is a collection of Bluetooth Low Energy (BLE) advertisement packets/traces generated from BLE beacons carried by people following their daily routine inside university building. A network Raspberry Pi 3 (RPi)-based edge devices were deployed multi-floor facility continuously gathering packets and storing them in cloud-based environment. data collected during an IRB (Institutional Review Board forhe Protection Human Subjects Research) approved one-month trial. Each...

10.48550/arxiv.1802.08782 preprint EN other-oa arXiv (Cornell University) 2018-01-01

The increasing demand for elastic and scalable cloud block storage requires flexible efficient ways to provision volumes. scheduling of volume requests in physical nodes or virtualized pools is usually based on a single criterion, such as the available capacity number volumes per backend. Those properties are exposed scheduler through drivers, may vary workload. Hence, most providers refrain from describing Service Level Objectives (SLOs). In this paper, we present design implementation new...

10.1109/icc.2015.7248353 article EN 2015-06-01

A major requirement of cloud block storage services is guaranteed performance and high availability. However, offering Service Level Agreements (SLAs) in often not straightforward. Cloud may be affected by physical disk background operations, like garbage collection, cluster features, workload interference the chraracteristcs itself. On other hand, underlying drives do expose internal states to higher level service offerings. Therefore, SLAs can only satisfied over-provisioning resources. To...

10.1109/cloud.2016.0115 article EN 2016-06-01

We investigate the performance of IEEE 802.11e while emphasizing on end-to-end delay performance. In our MAC analysis, we are based elementary conditional probabilities, avoiding complex Markov Chains method. For a thoroughly study delay, take Z-transform backoff duration in order to provide higher moments distribution. The first moment corresponds mean second Standard Deviation which depicts jitter. also estimate Probability Mass Function (PMF) through Lattice Poisson Algorithm. queuing...

10.5555/1385289.1385310 article EN International Conference on Mobile Multimedia Communications 2007-08-27

Proxy caches or Redundancy Elimination (RE) systems have been used to remove redundant bytes in WAN links. However, they come with some inherited deficiencies. provide less savings than RE systems, and limitations related speed, memory storage overhead. In this paper we advocate the use of a hybrid approach, which each type cache acts as module system shared space. A static scheduler precedes modules determines what types traffic should be forwarded module. We also propose several...

10.1109/icc.2012.6363843 article EN 2012-06-01

As most on-line services are now hosted on the cloud, customers requesting Service Level Agreements (SLAs) in order to use cloud with acceptable Quality of Service. Nonetheless, is based provisioning resources demand (known as elasticity). Hence, it primary importance design multi-tenant storage solutions that can provide guarantees equivalent or close bare-metal deployments. In this paper, we address problem scheduling volume create requests backend hosts. We and implement SLA-aware...

10.1109/cloudnet.2014.6968962 article EN 2014-10-01
Coming Soon ...