- Cloud Computing and Resource Management
- IoT and Edge/Fog Computing
- Advanced Wireless Network Optimization
- Indoor and Outdoor Localization Technologies
- Caching and Content Delivery
- Wireless Networks and Protocols
- Advanced Data Storage Technologies
- Green IT and Sustainability
- Mobile Ad Hoc Networks
- Advanced MIMO Systems Optimization
- Bluetooth and Wireless Communication Technologies
- IPv6, Mobility, Handover, Networks, Security
- Blockchain Technology Applications and Security
- Context-Aware Activity Recognition Systems
- Cloud Data Security Solutions
- Software System Performance and Reliability
- Network Traffic and Congestion Control
- Advanced Authentication Protocols Security
- Software-Defined Networks and 5G
- Internet Traffic Analysis and Secure E-voting
- Network Security and Intrusion Detection
- Electric Vehicles and Infrastructure
- Peer-to-Peer Network Technologies
- Fault Detection and Control Systems
- Energy Efficient Wireless Sensor Networks
University of Piraeus
2023-2024
Capgemini (Netherlands)
2022
Netflix (United States)
2016-2018
Purdue University West Lafayette
1983-2018
North Carolina State University
2007-2018
University of Patras
2006-2007
Micro-location is the process of locating any entity with high accuracy (possibly in centimeters), while geofencing creating a virtual fence around so-called Point Interest (PoI). In this paper, we present an insight into various micro-location enabling technologies and services. We also discuss how these can accelerate incorporation Internet Things (IoT) smart buildings. argue that based location-aware solutions play significant role facilitating tenants IoT equipped building. Also, such...
The Internet of Things (IoT) is intended for ubiquitous connectivity among different entities or "things". While its purpose to provide effective and efficient solutions, security the devices network a challenging issue. number connected along with ad-hoc nature system further exacerbates situation. Therefore, privacy has emerged as significant challenge IoT. In this paper,we aim thorough survey related challenges This document addresses these from perspective technologies architecture used....
Electric vehicles (EVs) are becoming a more attractive transportation option, as they offer great cost savings, decrease foreign oil dependency, and reduce carbon emissions. However, varying temporal spatial demand patterns of EVs threatens power grid operations its physical components. Thus, the ability to handle potential extra load has become major factor in mainstream success. In order for this integration occur seamlessly, consumers need be coordinated harmony. paper, we address...
In order to meet the requirements of 4G mobile networks targeted by cellular layer IMT-advanced, next generation WiMAX devices based on IEEE 802.16m will incorporate sophisticated signal processing, seamless handover functionalities between heterogeneous technologies and advanced mobility mechanisms. This survey provides a description key projected features physical (PHY) medium access control (MAC) layers 802.16m, as major candidate for providing aggregate rates at range Gbps high-speed...
The advent of Bluetooth Low Energy (BLE) enabled Beacons is poised to revolutionize the indoor contextual aware services users. Due lower energy consumption and higher throughput, BLE could therefore be an integral pillar Internet Things (IoT) Location Based Service (LBS). Tracking a user with high accuracy known as Micro-Location. This requirement many IoT user-centric applications for environments. Although several technologies have been used tracking purposes, has always serious issue. At...
Microlocation plays a key role in the transformation of traditional buildings into smart infrastructure. is process locating any entity with very high accuracy, possibly centimeters. Such technologies require detection energy efficiency, wide reception range, low cost, and availability. In this article, we provide insights various microlocation-enabling technologies, techniques, services discuss how they can accelerate incorporation Internet Things (IoT) buildings. We cover challenges...
To facilitate the adoption of electric vehicles (EVs) and their plug-in hybrid (PHEVs) counterparts to avoid straining capacity power grid there is a strong need for developing network fast charging facilities coordinate service. Incorporation EVs in vehicle fleet would decrease green house gas emissions overall dependency on fossil fuels. A key issue that corresponding time fairly large, which can lead very long delays. Hence, stations provide good quality service customers, we first...
The accelerated evolution of Internet Things (IoT) architectures and their incorporation in vehicles, buildings, or cities provide the ideal environment for development optimization smart services. Under this light, positioning services that harvest location fingerprinting based on received signal strength indications (RSSIs) are widely popular due to massive data generation IoT settings provide. However, labor-intensive repetitive task radio map construction through offline RSSI fingerprint...
Proximity-based Services (PBS) require high detection accuracy, energy efficiency, wide reception range, low cost and availability. However, most existing technologies cannot satisfy all these requirements. Apple's Bluetooth Low Energy (BLE), named iBeacon, has emerged as a leading candidate in this domain become an almost industry standard for PBS. it several limitations. It suffers from poor proximity accuracy due to its reliance on Received Signal Strength Indicator (RSSI). To improve of...
The secure and efficient operation of time-critical networks, such as vehicular smart-grid, other smart-infrastructures, is primary importance in today's society. It crucial to minimize the impact security mechanisms over networks so that safe reliable operations systems are not being interfered. For instance, if delay introduced by crypto negatively affects time available for braking a car before collision, may be able safely stop time. In particular, authentication mechanism, existing...
Indoor localization can provide a number of different services such as location-aware advertisement, indoor navigation and automating appliances based on the user location. A techniques time-difference- of-arrival, angle-of-arrival, time-of-flight, received signal strength indicator (RSSI) have been used to Location Based Services (LBS). RSSI is one widely methods it cost efficient easy implement. However, RSSI's performance limited by multipath fading noise. Particle Filter (PF) an accurate...
Modern vehicles are being equipped with advanced sensing and communication technologies, which enable them to connect surrounding entities. In military vehicular networks, it is vital prevent adversaries from manipulating critical messages via cryptographic protection (e.g., digital signatures) at the same time minimize impact introduced by crypto operations delay). Hence, their must be delay-aware, scalable secure. this paper, we developed Hardware-Accelerated Authentication (HAA) that...
The IEEE 802.11 protocol is the dominant standard for wireless local area networks (WLANs) and has generated much interests in investigating improving its performance. medium access control (MAC) mainly based on distributed coordination function (DCF). DCF uses a carrier sense multiple with collision avoidance (CSMA/CA) order to resolve contention between stations verify successful transmissions. In this paper we present an extensive investigation of performance 802.11b MAC protocol, respect...
The Dynamic Host Configuration Protocol (DHCP) was introduced nearly 20 years ago as a mechanism for hosts to automatically acquire IP addresses. While the protocol remains same, its usage has evolved, especially in last decade with introduction of mobile devices and wireless local area networks. In this paper we investigate impact that new types devices, such smartphones, have on DHCP. We use two one-month long traces, collected at corporate an educational network, compare side-by-side DHCP...
In this work we present the differences and similarities of web browsing behavior in most common mobile platforms. We devise a novel Operating System (OS) fingerprinting methodology to distinguish different types wireless devices (smartphone vs laptops) as well operating system instances (iOS, Android, BlackBerry etc.). showcase that multimedia content smartphone is delivered via Range-Requests, large portion video transfers are aborted. also show laptop have more intelligent browser caching...
Software Defined Storage (SDS) separates the control layer from data allowing automation of management and deployment Commercial Off-The-Shelf (COTS) storage media rather than expensive traditional hardware-based solutions. Cloud block services lack an SDS framework that allows customization storage, policy enforcement, automate provisioning, management. decreases human intervention improves resource utilization. Moreover, cloud tenants to define customized functionalities based on their...
A new medium access control (MAC) protocol is proposed for quality-of-service (QoS) support in wireless local area networks (WLAN). The an alternative to the recent enhancement 802.11e. priority policy provides system with better performance by simulating time division multiple (TDMA) functionality. Collisions are reduced and starvation of low-priority classes prevented a distributed admission algorithm. model found analytically extending previous work on this matter. results show that...
Traffic classification has become a crucial domain of research due to the rise in applications that are either encrypted or tend change port consecutively. The challenge flow is determine involved without any information on payload. In this paper, our goal achieve robust and reliable using data mining techniques. We propose model which not only classifies traffic, but also performs behavior pattern profiling. implemented by clustering algorithms, association rules derived "Apriori"...
An increasing number of technology enterprises are adopting cloud-native architectures to offer their web-based products, by moving away from privately-owned data-centers and relying exclusively on cloud service providers. As a result, vendors have lately increased, along with the estimated annual revenue they share. However, in process selecting provider's over competition, we observe lack universal common ground terms terminology, functionality services billing models. This is an important...
The BLEBeacon dataset is a collection of Bluetooth Low Energy (BLE) advertisement packets/traces generated from BLE beacons carried by people following their daily routine inside university building. A network Raspberry Pi 3 (RPi)-based edge devices were deployed multi-floor facility continuously gathering packets and storing them in cloud-based environment. data collected during an IRB (Institutional Review Board forhe Protection Human Subjects Research) approved one-month trial. Each...
The increasing demand for elastic and scalable cloud block storage requires flexible efficient ways to provision volumes. scheduling of volume requests in physical nodes or virtualized pools is usually based on a single criterion, such as the available capacity number volumes per backend. Those properties are exposed scheduler through drivers, may vary workload. Hence, most providers refrain from describing Service Level Objectives (SLOs). In this paper, we present design implementation new...
A major requirement of cloud block storage services is guaranteed performance and high availability. However, offering Service Level Agreements (SLAs) in often not straightforward. Cloud may be affected by physical disk background operations, like garbage collection, cluster features, workload interference the chraracteristcs itself. On other hand, underlying drives do expose internal states to higher level service offerings. Therefore, SLAs can only satisfied over-provisioning resources. To...
We investigate the performance of IEEE 802.11e while emphasizing on end-to-end delay performance. In our MAC analysis, we are based elementary conditional probabilities, avoiding complex Markov Chains method. For a thoroughly study delay, take Z-transform backoff duration in order to provide higher moments distribution. The first moment corresponds mean second Standard Deviation which depicts jitter. also estimate Probability Mass Function (PMF) through Lattice Poisson Algorithm. queuing...
Proxy caches or Redundancy Elimination (RE) systems have been used to remove redundant bytes in WAN links. However, they come with some inherited deficiencies. provide less savings than RE systems, and limitations related speed, memory storage overhead. In this paper we advocate the use of a hybrid approach, which each type cache acts as module system shared space. A static scheduler precedes modules determines what types traffic should be forwarded module. We also propose several...
As most on-line services are now hosted on the cloud, customers requesting Service Level Agreements (SLAs) in order to use cloud with acceptable Quality of Service. Nonetheless, is based provisioning resources demand (known as elasticity). Hence, it primary importance design multi-tenant storage solutions that can provide guarantees equivalent or close bare-metal deployments. In this paper, we address problem scheduling volume create requests backend hosts. We and implement SLA-aware...