Panagiotis Karkazis

ORCID: 0000-0003-4971-826X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Energy Efficient Wireless Sensor Networks
  • IoT and Edge/Fog Computing
  • Software-Defined Networks and 5G
  • Mobile Ad Hoc Networks
  • Security in Wireless Sensor Networks
  • Cloud Computing and Resource Management
  • Advanced MIMO Systems Optimization
  • Advanced Wireless Communication Technologies
  • Blockchain Technology Applications and Security
  • Energy Harvesting in Wireless Networks
  • Advanced Optical Network Technologies
  • Caching and Content Delivery
  • IoT Networks and Protocols
  • Software System Performance and Reliability
  • Context-Aware Activity Recognition Systems
  • Smart Grid Security and Resilience
  • Satellite Communication Systems
  • Digital Transformation in Industry
  • Opportunistic and Delay-Tolerant Networks
  • Cooperative Communication and Network Coding
  • Bluetooth and Wireless Communication Technologies
  • Indoor and Outdoor Localization Technologies
  • Vehicular Ad Hoc Networks (VANETs)
  • Underwater Vehicles and Communication Systems
  • Telecommunications and Broadcasting Technologies

University of West Attica
2018-2025

Synelixis (Greece)
2014-2024

National and Kapodistrian University of Athens
2024

Hellenic Open University
2021-2023

Azienda Unità Sanitaria Locale Della Romagna
2023

University of the West
2020

Exelixis (United States)
2018-2019

Technological Educational Institute of Central Greece
2009-2015

Technical University of Crete
2010-2014

Technological Educational Institute of Thessaly
2014

The digitization of manufacturing industry has led to leaner and more efficient production, under the Industry 4.0 concept. Nowadays, datasets collected from shop floor assets information technology (IT) systems are used in data-driven analytics efforts support informed business intelligence decisions. However, these results currently only isolated dispersed parts production process. At same time, full integration artificial (AI) all is lacking. In this context, goal manuscript present a...

10.3390/s20195480 article EN cc-by Sensors 2020-09-24

The diversity of applications that current and emerging Wireless Sensor Networks (WSNs) are called to support imposes different requirements on the underlying network with respect delay loss, while at same time WSN its own intricacies. satisfaction these highly depends metric upon which forwarding routes decided. In this view, IETF ROLL group has proposed RPL routing protocol, can flexibly work various metrics, as long they hold specific properties. system implementer/user is free decide...

10.1109/temu.2012.6294705 article EN 2012-07-01

5G is considered to be the technology that will accommodate development and management of innovative services with stringent diverse requirements from end users, calling for new business models industry. In this context, efficient Network Services (NS) serving specific vertical industries spanning across multiple administrative domains heterogeneous infrastructures challenging. The main challenges regard provision NSs considering Quality Service (QoS) per industry along optimal usage...

10.3390/jsan9010004 article EN cc-by Journal of Sensor and Actuator Networks 2020-01-04

Energy efficiency (EE) constitutes a key target in the deployment of 5G networks, especially due to increased densification and heterogeneity. In this paper, Deep Q-Network (DQN) based power control scheme is proposed for improving system-level EE two-tier heterogeneous multi-channel cells. The algorithm aims maximize system by regulating transmission downlink channels reconfiguring user association scheme. To efficiently solve problem, DQN-based method established, properly modified ensure...

10.1109/access.2021.3113501 article EN cc-by IEEE Access 2021-01-01

The provision of high data rate services to mobile users combined with improved quality experience (i.e., zero latency multimedia content) drives technological evolution towards the design and implementation fifth generation (5G) broadband wireless networks. To this end, a dynamic network approach is adopted whereby topology configured according service demands. In parallel, many private companies are interested in developing their own 5G networks, also referred as non-public networks...

10.3390/s21165578 article EN cc-by Sensors 2021-08-19

Computing has undergone a significant transformation over the past two decades, shifting from machine-based approach to human-centric, virtually invisible service known as ubiquitous or pervasive computing. This change been achieved by incorporating small embedded devices into larger computational system, connected through networking and referred edge devices. When these are also Internet, they generally named Internet-of-Thing (IoT) Developing Machine Learning (ML) algorithms on types of...

10.3390/s23031595 article EN cc-by Sensors 2023-02-01

The advancement and acceptance of new technologies often hinges on the level understanding trust among potential users. Blockchain technology, despite its broad applications across diverse sectors, is met with skepticism due to a general lack incidents illicit activities in cryptocurrency domain. This study aims demystify blockchain technology by providing an in-depth examination application novel blockchain-based card game, centered around renewable energy sustainable resource management....

10.3390/computers13010014 article EN cc-by Computers 2024-01-03

Modern supply chains comprise an increasing number of actors which deploy different information technology systems that capture a diverse nature and sources (from sensors to order information). While the benefits automatic exchange between these have been recognized led their interconnection, protecting whole chain from potential attacks is challenging issue given attack proliferation reported in literature. In this paper, we present FISHY platform, anticipates by (a) adopting novel...

10.3390/electronics13010215 article EN Electronics 2024-01-03

The domain of Wireless Sensor Networks (WSNs) applications is increasing widely over the last few years.As this new type networking characterized by severely constrained node resources, limited network resources and requirement to operate in an ad hoc manner, implementing security functionality protect against adversary nodes becomes a challenging task.In paper, we present trust-aware, location-based routing protocol which protects WSN attacks, also supports large-scale WSNs deployments.The...

10.5121/ijnsa.2010.2304 article EN International Journal of Network Security & Its Applications 2010-07-09

The massive deployment of IoT devices, broadband and mission critical services are paving the way for 5G communication networks, which will enable capacity, zero delay, elasticity optimal deployment, enhanced security, privacy by design connectivity to billions devices with less predictable traffic patterns. This paper targets a very important demanding application Preventive Maintenance as Service in Critical Infrastructures more precisely energy (electricity gas) transmission distribution...

10.1109/avss.2017.8078465 article EN 2017-08-01

With the advent of Software Defined Networking (SDN) and Network Function Virtualization (NFV) technologies, networking infrastructures are becoming increasingly agile in their attempts to offer quality services needed by users, maximizing efficiency infrastructure utilization. This essence mandates statistical multiplexing demands across different Providers (NPs), which would allow them cope with increasing demand, upgrading at a slower pace. However, enjoy benefits multiplexing, trusted...

10.3390/info11120570 article EN cc-by Information 2020-12-06

The Industry 4.0 sector is evolving in a tremendous pace by introducing set of industrial automation mechanisms tightly coupled with the exploitation Internet Things (IoT), 5G and Artificial Intelligence (AI) technologies. By combining such emerging technologies, interconnected sensors, instruments, other devices are networked together applications, formulating Industrial IoT (IIoT) aiming to improve efficiency reliability deployed applications provide Quality Service (QoS) guarantees....

10.1109/netsoft48620.2020.9165393 article EN 2020-06-01

ABSTRACT As the applications of wireless sensor networks proliferate, efficiency in supporting large and offering security guarantees becomes an important requirement design relevant networking protocols. Geographical routing has been proven to efficiently cope with network dimensions while trust management schemes have shown assist defending against attacks. Once information is available for all nodes, decisions can take it into account, i.e. be based on both location attributes. In this...

10.1002/wcm.1038 article EN Wireless Communications and Mobile Computing 2010-12-28

In pursuit of a flexible, resource efficient and high- performant 5G infrastructure, many operators, vendors research consortia are currently developing, testing inte­grating their NFV platform with associated management orchestration (MANO) functionality. The SONATA follows micro-service design, which involves tight coupling between an SDK, monitoring MANO functionality, targeting secure stable software foundation. This experience paper gives thorough overview on the encountered challenges,...

10.1109/noms.2018.8406139 article EN NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium 2018-04-01

Power allocation is strongly related to the coverage and capacity of wireless networks, playing a critical role in development 5G networks. This paper proposes Demand-Driven Allocation (DDPA) algorithm aiming fulfill requested throughput individual users accommodate their needs. DDPA based on model-free Deep Reinforcement Learning (DRL) approaches has ability proactively adjust power levels network transmitters. The performance developed evaluated for variety simulation parameters variable...

10.1109/wowmom51794.2021.00045 article EN 2021-06-01

In present times, the largest amount of data is being controlled in a centralized manner. However, as are essence fuel any application and service, there need to make more findable accessible. Another problem with limited storage well uncertainty their authenticity. Internet Things (IoT) sector specifically, key develop most powerful reliable applications. For these reasons, rise on works that decentralized marketplaces for IoT many them exploiting blockchain technology offer security...

10.3390/jsan11030039 article EN cc-by Journal of Sensor and Actuator Networks 2022-07-29

ABSTRACT The usability of wireless sensor networks in modern applications requires the fulfillment dynamic Quality Service (QoS) requirements that can only be met a reactive manner by introduction composite routing metrics, capturing several distinct network characteristics. However, combining metrics is neither trivial nor an arbitrary task, given protocol and properties. In this paper, theoretical framework algebra formalism adopted extended to incorporate single or because satisfaction...

10.1002/ett.2592 article EN Transactions on Emerging Telecommunications Technologies 2012-10-11

Wireless Sensor Networks (WSNs) often need to operate under strict requirements on energy consumption and be capable of self-adapting the presence non-trusted nodes which do not fully cooperate in packet forwarding operation. In such an environment, mechanism employed for calculation routing paths minimum cost terms number transmissions executed reliable communication between data source sink is essential prevent unnecessary nodes' depletion help prolong network's lifetime. this paper, we...

10.1109/icc.2014.6883376 article EN 2014-06-01

Security has been recognised as a key issue for the expansion of wireless sensor network applications. To defend against wide set security attacks, legacy solutions are not applicable due to very limited memory and processing resources nodes well reason that networks required operate in an autonomous infrastructureless manner. Trust management schemes consist powerful tool detection unexpected node behaviours (either faulty or malicious). Once misbehaving detected, their neighbours can use...

10.1109/isads.2009.5207367 article EN International Symposium on Autonomous Decentralized Systems 2009-03-01

Security in sensor networks is one of the most relevant research topics resource constrained wireless devices and networks. Several attacks can be suffered ad hoc (WSN), which are highly susceptible to attacks, due limited resources nodes. In this paper, we propose innovative lightweight localization techniques that allow for intrusion identification isolation schemes provide accurate location information. This information used by our routing protocol additionally incorporates a distributed...

10.1155/2010/975607 article EN cc-by EURASIP Journal on Wireless Communications and Networking 2010-08-10

Recently, Routing Protocol for Low Power and Lossy Networks (RPL) has been proposed by IETF ROLL WG in order to cope with (LLN) requirements implied different application domains. In this paper, we present RPL modeling J-Sim simulation environment, providing a complete framework performance evaluation as well experimentation on open issues, such the support of multiple instances definition routing strategies based composition several metrics.

10.1109/inss.2012.6240559 article EN 2012-06-01

Communication systems are used not only by voice or file exchange applications, but also other types of applications due to the coexistence multiple and different verticals. Each vertical has its own requirements in terms key performance indicators (KPIs) for their applications. Mapping verticals KPIs into network quality service (QoS) parameters enforcing it at level is a complex procedure. Network slicing allows deployment virtual networks (one per vertical) work parallel with specific QoS...

10.1109/mcom.001.2001077 article EN IEEE Communications Magazine 2021-07-01
Coming Soon ...