- Energy Efficient Wireless Sensor Networks
- IoT and Edge/Fog Computing
- Software-Defined Networks and 5G
- Mobile Ad Hoc Networks
- Security in Wireless Sensor Networks
- Cloud Computing and Resource Management
- Advanced MIMO Systems Optimization
- Advanced Wireless Communication Technologies
- Blockchain Technology Applications and Security
- Energy Harvesting in Wireless Networks
- Advanced Optical Network Technologies
- Caching and Content Delivery
- IoT Networks and Protocols
- Software System Performance and Reliability
- Context-Aware Activity Recognition Systems
- Smart Grid Security and Resilience
- Satellite Communication Systems
- Digital Transformation in Industry
- Opportunistic and Delay-Tolerant Networks
- Cooperative Communication and Network Coding
- Bluetooth and Wireless Communication Technologies
- Indoor and Outdoor Localization Technologies
- Vehicular Ad Hoc Networks (VANETs)
- Underwater Vehicles and Communication Systems
- Telecommunications and Broadcasting Technologies
University of West Attica
2018-2025
Synelixis (Greece)
2014-2024
National and Kapodistrian University of Athens
2024
Hellenic Open University
2021-2023
Azienda Unità Sanitaria Locale Della Romagna
2023
University of the West
2020
Exelixis (United States)
2018-2019
Technological Educational Institute of Central Greece
2009-2015
Technical University of Crete
2010-2014
Technological Educational Institute of Thessaly
2014
The digitization of manufacturing industry has led to leaner and more efficient production, under the Industry 4.0 concept. Nowadays, datasets collected from shop floor assets information technology (IT) systems are used in data-driven analytics efforts support informed business intelligence decisions. However, these results currently only isolated dispersed parts production process. At same time, full integration artificial (AI) all is lacking. In this context, goal manuscript present a...
The diversity of applications that current and emerging Wireless Sensor Networks (WSNs) are called to support imposes different requirements on the underlying network with respect delay loss, while at same time WSN its own intricacies. satisfaction these highly depends metric upon which forwarding routes decided. In this view, IETF ROLL group has proposed RPL routing protocol, can flexibly work various metrics, as long they hold specific properties. system implementer/user is free decide...
5G is considered to be the technology that will accommodate development and management of innovative services with stringent diverse requirements from end users, calling for new business models industry. In this context, efficient Network Services (NS) serving specific vertical industries spanning across multiple administrative domains heterogeneous infrastructures challenging. The main challenges regard provision NSs considering Quality Service (QoS) per industry along optimal usage...
Energy efficiency (EE) constitutes a key target in the deployment of 5G networks, especially due to increased densification and heterogeneity. In this paper, Deep Q-Network (DQN) based power control scheme is proposed for improving system-level EE two-tier heterogeneous multi-channel cells. The algorithm aims maximize system by regulating transmission downlink channels reconfiguring user association scheme. To efficiently solve problem, DQN-based method established, properly modified ensure...
The provision of high data rate services to mobile users combined with improved quality experience (i.e., zero latency multimedia content) drives technological evolution towards the design and implementation fifth generation (5G) broadband wireless networks. To this end, a dynamic network approach is adopted whereby topology configured according service demands. In parallel, many private companies are interested in developing their own 5G networks, also referred as non-public networks...
Computing has undergone a significant transformation over the past two decades, shifting from machine-based approach to human-centric, virtually invisible service known as ubiquitous or pervasive computing. This change been achieved by incorporating small embedded devices into larger computational system, connected through networking and referred edge devices. When these are also Internet, they generally named Internet-of-Thing (IoT) Developing Machine Learning (ML) algorithms on types of...
The advancement and acceptance of new technologies often hinges on the level understanding trust among potential users. Blockchain technology, despite its broad applications across diverse sectors, is met with skepticism due to a general lack incidents illicit activities in cryptocurrency domain. This study aims demystify blockchain technology by providing an in-depth examination application novel blockchain-based card game, centered around renewable energy sustainable resource management....
Modern supply chains comprise an increasing number of actors which deploy different information technology systems that capture a diverse nature and sources (from sensors to order information). While the benefits automatic exchange between these have been recognized led their interconnection, protecting whole chain from potential attacks is challenging issue given attack proliferation reported in literature. In this paper, we present FISHY platform, anticipates by (a) adopting novel...
The domain of Wireless Sensor Networks (WSNs) applications is increasing widely over the last few years.As this new type networking characterized by severely constrained node resources, limited network resources and requirement to operate in an ad hoc manner, implementing security functionality protect against adversary nodes becomes a challenging task.In paper, we present trust-aware, location-based routing protocol which protects WSN attacks, also supports large-scale WSNs deployments.The...
The massive deployment of IoT devices, broadband and mission critical services are paving the way for 5G communication networks, which will enable capacity, zero delay, elasticity optimal deployment, enhanced security, privacy by design connectivity to billions devices with less predictable traffic patterns. This paper targets a very important demanding application Preventive Maintenance as Service in Critical Infrastructures more precisely energy (electricity gas) transmission distribution...
With the advent of Software Defined Networking (SDN) and Network Function Virtualization (NFV) technologies, networking infrastructures are becoming increasingly agile in their attempts to offer quality services needed by users, maximizing efficiency infrastructure utilization. This essence mandates statistical multiplexing demands across different Providers (NPs), which would allow them cope with increasing demand, upgrading at a slower pace. However, enjoy benefits multiplexing, trusted...
The Industry 4.0 sector is evolving in a tremendous pace by introducing set of industrial automation mechanisms tightly coupled with the exploitation Internet Things (IoT), 5G and Artificial Intelligence (AI) technologies. By combining such emerging technologies, interconnected sensors, instruments, other devices are networked together applications, formulating Industrial IoT (IIoT) aiming to improve efficiency reliability deployed applications provide Quality Service (QoS) guarantees....
ABSTRACT As the applications of wireless sensor networks proliferate, efficiency in supporting large and offering security guarantees becomes an important requirement design relevant networking protocols. Geographical routing has been proven to efficiently cope with network dimensions while trust management schemes have shown assist defending against attacks. Once information is available for all nodes, decisions can take it into account, i.e. be based on both location attributes. In this...
In pursuit of a flexible, resource efficient and high- performant 5G infrastructure, many operators, vendors research consortia are currently developing, testing integrating their NFV platform with associated management orchestration (MANO) functionality. The SONATA follows micro-service design, which involves tight coupling between an SDK, monitoring MANO functionality, targeting secure stable software foundation. This experience paper gives thorough overview on the encountered challenges,...
Power allocation is strongly related to the coverage and capacity of wireless networks, playing a critical role in development 5G networks. This paper proposes Demand-Driven Allocation (DDPA) algorithm aiming fulfill requested throughput individual users accommodate their needs. DDPA based on model-free Deep Reinforcement Learning (DRL) approaches has ability proactively adjust power levels network transmitters. The performance developed evaluated for variety simulation parameters variable...
In present times, the largest amount of data is being controlled in a centralized manner. However, as are essence fuel any application and service, there need to make more findable accessible. Another problem with limited storage well uncertainty their authenticity. Internet Things (IoT) sector specifically, key develop most powerful reliable applications. For these reasons, rise on works that decentralized marketplaces for IoT many them exploiting blockchain technology offer security...
ABSTRACT The usability of wireless sensor networks in modern applications requires the fulfillment dynamic Quality Service (QoS) requirements that can only be met a reactive manner by introduction composite routing metrics, capturing several distinct network characteristics. However, combining metrics is neither trivial nor an arbitrary task, given protocol and properties. In this paper, theoretical framework algebra formalism adopted extended to incorporate single or because satisfaction...
Wireless Sensor Networks (WSNs) often need to operate under strict requirements on energy consumption and be capable of self-adapting the presence non-trusted nodes which do not fully cooperate in packet forwarding operation. In such an environment, mechanism employed for calculation routing paths minimum cost terms number transmissions executed reliable communication between data source sink is essential prevent unnecessary nodes' depletion help prolong network's lifetime. this paper, we...
Security has been recognised as a key issue for the expansion of wireless sensor network applications. To defend against wide set security attacks, legacy solutions are not applicable due to very limited memory and processing resources nodes well reason that networks required operate in an autonomous infrastructureless manner. Trust management schemes consist powerful tool detection unexpected node behaviours (either faulty or malicious). Once misbehaving detected, their neighbours can use...
Security in sensor networks is one of the most relevant research topics resource constrained wireless devices and networks. Several attacks can be suffered ad hoc (WSN), which are highly susceptible to attacks, due limited resources nodes. In this paper, we propose innovative lightweight localization techniques that allow for intrusion identification isolation schemes provide accurate location information. This information used by our routing protocol additionally incorporates a distributed...
Recently, Routing Protocol for Low Power and Lossy Networks (RPL) has been proposed by IETF ROLL WG in order to cope with (LLN) requirements implied different application domains. In this paper, we present RPL modeling J-Sim simulation environment, providing a complete framework performance evaluation as well experimentation on open issues, such the support of multiple instances definition routing strategies based composition several metrics.
Communication systems are used not only by voice or file exchange applications, but also other types of applications due to the coexistence multiple and different verticals. Each vertical has its own requirements in terms key performance indicators (KPIs) for their applications. Mapping verticals KPIs into network quality service (QoS) parameters enforcing it at level is a complex procedure. Network slicing allows deployment virtual networks (one per vertical) work parallel with specific QoS...