2022
Sotirios K Goudos; Panagiotis D Diamantoulakis; Mohammad A Matin; Panagiotis Sarigiannidis; Shaohua Wan; George K Karagiannidis
Design of Antennas through Artificial Intelligence: State-of-the-Art and Challenges Journal Article
In: IEEE Communications Magazine, pp. 1-7, 2022, ISSN: 1558-1896.
Abstract | BibTeX | Tags: Antenna arrays, Antennas, Behavioral sciences, Codes, Genetic algorithms, Linear antenna arrays, Optimization | Links:
@article{9903377,
title = {Design of Antennas through Artificial Intelligence: State-of-the-Art and Challenges},
author = {Sotirios K Goudos and Panagiotis D Diamantoulakis and Mohammad A Matin and Panagiotis Sarigiannidis and Shaohua Wan and George K Karagiannidis},
doi = {10.1109/MCOM.006.2200124},
issn = {1558-1896},
year = {2022},
date = {2022-09-26},
journal = {IEEE Communications Magazine},
pages = {1-7},
abstract = {Antenna is a critical part of the RF front end of a communication system. In this study, we present some of the major applications of artificial intelligence (AI) to antenna design. We review the previous research and applications of several AI techniques such as evolutionary algorithms,machine learning, and knowledge representation ontologies. Applications may vary from antenna design to antenna features evaluation in a research field, which is rapidly growing. Finally, we summarize the challenges of new AI techniques in antenna design based on the current state-of-the-art and predict its future research directions.},
keywords = {Antenna arrays, Antennas, Behavioral sciences, Codes, Genetic algorithms, Linear antenna arrays, Optimization},
pubstate = {published},
tppubtype = {article}
}
Anna Triantafyllou; Dimitrios Zorbas; Panagiotis Sarigiannidis
Time-slotted LoRa MAC with variable payload support Journal Article
In: Computer Communications, vol. 193, 2022.
Abstract | BibTeX | Tags: LoRaWAN, time-slotted scheme, TS-VP-LoRa | Links:
@article{articled,
title = {Time-slotted LoRa MAC with variable payload support},
author = {Anna Triantafyllou and Dimitrios Zorbas and Panagiotis Sarigiannidis},
url = {https://www.researchgate.net/publication/361718810_Time-slotted_LoRa_MAC_with_variable_payload_support},
doi = {10.1016/j.comcom.2022.06.043},
year = {2022},
date = {2022-09-01},
journal = {Computer Communications},
volume = {193},
abstract = {LoRaWAN is an upcoming Low Power Wide Area Network (LPWAN) technology for Internet of Things implementations in various application domains. Despite its various advantages, LoRaWAN employs an Aloha-based MAC, which in terms of performance can not guarantee high packet delivery ratio and low latency. To overcome this issue, we propose a time-slotted scheme, called TS-VP-LoRa, which supports multiple transmission times and packet sizes at the same time. In TS-VP-LoRa, scheduling is coordinated by the LoRa gateway, broadcasting beacon frames periodically for the synchronization of LoRa end-devices. A channel hopping mechanism is also proposed in order to minimize the occurrence of collisions and to evenly split the transmission load among all channels. TS-VP-LoRa is evaluated and compared to three other MAC-layer schemes in single gateway simulation scenarios with up to 500 nodes. The proposed scheme has proven to achieve low latency with high packet delivery ratios, significantly minimize collisions and maintain a relatively low energy consumption despite the scaling of the LoRa network.},
keywords = {LoRaWAN, time-slotted scheme, TS-VP-LoRa},
pubstate = {published},
tppubtype = {article}
}
Athanasios Liatifis; Christos Dalamagkas; Panagiotis Radoglou-Grammatikis; Thomas Lagkas; Evangelos Markakis; Valeri Mladenov; Panagiotis Sarigiannidis
Fault-Tolerant SDN Solution for Cybersecurity Applications Conference
Proceedings of the 17th International Conference on Availability, Reliability and Security, ARES '22 Association for Computing Machinery, Vienna, Austria, 2022, ISBN: 9781450396707.
Abstract | BibTeX | Tags: Cybersecurity, Smart Grid, Software Defined Networking | Links:
@conference{10.1145/3538969.3544479b,
title = {Fault-Tolerant SDN Solution for Cybersecurity Applications},
author = {Athanasios Liatifis and Christos Dalamagkas and Panagiotis Radoglou-Grammatikis and Thomas Lagkas and Evangelos Markakis and Valeri Mladenov and Panagiotis Sarigiannidis},
url = {https://doi.org/10.1145/3538969.3544479
},
doi = {10.1145/3538969.3544479},
isbn = {9781450396707},
year = {2022},
date = {2022-08-23},
booktitle = {Proceedings of the 17th International Conference on Availability, Reliability and Security},
publisher = {Association for Computing Machinery},
address = {Vienna, Austria},
series = {ARES '22},
abstract = {The rapid growth of computer networks in various sectors has led to new services previously hard or impossible to implement. Internet of Things has also assisted in this evolution offering easy access to data but at the same time imposing constraints on both security and quality of service. In this paper, an SDN fault tolerant and resilient SDN controller design approach is presented. The proposed solution is suitable for a wide range of environments. Benefits stemming from actual scenarios are presented and discussed among other solutions.},
keywords = {Cybersecurity, Smart Grid, Software Defined Networking},
pubstate = {published},
tppubtype = {conference}
}
Lazaros Alexios Iliadis; Zaharias Zaharis; Sotirios Sotiroudis; Panagiotis Sarigiannidis; George Karagiannidis; Sotirios Goudos
The road to 6G: a comprehensive survey of deep learning applications in cell-free massive MIMO communications systems Journal Article
In: EURASIP Journal on Wireless Communications and Networking, vol. 2022, 2022.
Abstract | BibTeX | Tags: 6G, Cell-free massive MIMO, Deep Learning, User-centric cell-free massive MIMO | Links:
@article{articlec,
title = {The road to 6G: a comprehensive survey of deep learning applications in cell-free massive MIMO communications systems},
author = {Lazaros Alexios Iliadis and Zaharias Zaharis and Sotirios Sotiroudis and Panagiotis Sarigiannidis and George Karagiannidis and Sotirios Goudos},
url = {https://www.researchgate.net/publication/362590698_The_road_to_6G_a_comprehensive_survey_of_deep_learning_applications_in_cell-free_massive_MIMO_communications_systems},
doi = {10.1186/s13638-022-02153-z},
year = {2022},
date = {2022-08-01},
journal = {EURASIP Journal on Wireless Communications and Networking},
volume = {2022},
abstract = {The fifth generation (5G) of telecommunications networks is currently commercially deployed. One of their core enabling technologies is cellular Massive Multiple-Input-Multiple-Output (M-MIMO) systems. However, future wireless networks are expected to serve a very large number of devices and the current MIMO networks are not scalable, highlighting the need for novel solutions. At this moment, Cell-free Massive MIMO (CF M-MIMO) technology seems to be the most promising idea in this direction. Despite their appealing characteristics, CF M-MIMO systems face their own challenges, such as power allocation and channel estimation. Deep Learning (DL) has been successfully employed to a wide range of problems in many different research areas, including wireless communications. In this paper, a review of the state-of-the-art DL methods applied to CF M-MIMO communications systems is provided. In addition, the basic characteristics of Cell-free networks are introduced, along with the presentation of the most commonly used DL models. Finally, future research directions are highlighted.},
keywords = {6G, Cell-free massive MIMO, Deep Learning, User-centric cell-free massive MIMO},
pubstate = {published},
tppubtype = {article}
}
Athanasios Liatifis; Panagiotis Sarigiannidis; Vasileios Argyriou; Thomas Lagkas
Advancing SDN: from OpenFlow to P4, a Survey Journal Article
In: ACM Computing Surveys, 2022, ISSN: 0360-0300.
Abstract | BibTeX | Tags: Next Generation SDN, P4, Programmable Networks, SDN | Links:
@article{articleb,
title = {Advancing SDN: from OpenFlow to P4, a Survey},
author = {Athanasios Liatifis and Panagiotis Sarigiannidis and Vasileios Argyriou and Thomas Lagkas},
url = {https://www.researchgate.net/publication/362963601_Advancing_SDN_from_OpenFlow_to_P4_a_Survey},
doi = {10.1145/3556973},
issn = {0360-0300},
year = {2022},
date = {2022-08-01},
journal = {ACM Computing Surveys},
abstract = {Software Defined Networking (SDN) marked the beginning of a new era in the field of networking by decoupling the control and forwarding processes through the OpenFlow protocol. The Next Generation SDN is defined by Open Interfaces and full programmability of the data plane. P4 is a domain specific language that fulfills these requirements and has known wide adoption over the last years from Academia and Industry. This work is an extensive survey of the P4 language covering domains of application, a detailed overview of the language and future directions.},
keywords = {Next Generation SDN, P4, Programmable Networks, SDN},
pubstate = {published},
tppubtype = {article}
}
Elisavet Grigoriou; Athanasios Liatifis; Panagiotis Radoglou Grammatikis; Thomas Lagkas; Ioannis Moscholios; Evangelos Markakis; Panagiotis Sarigiannidis
Protecting IEC 60870-5-104 ICS/SCADA Systems with Honeypots Conference
2022 IEEE International Conference on Cyber Security and Resilience (CSR), 2022, ISBN: 978-1-6654-9952-1.
Abstract | BibTeX | Tags: Cybersecurity, Honeypots, ICS, SCADA | Links:
@conference{9850329,
title = {Protecting IEC 60870-5-104 ICS/SCADA Systems with Honeypots},
author = {Elisavet Grigoriou and Athanasios Liatifis and Panagiotis Radoglou Grammatikis and Thomas Lagkas and Ioannis Moscholios and Evangelos Markakis and Panagiotis Sarigiannidis},
url = {https://www.researchgate.net/publication/362744045_Protecting_IEC_60870-5-104_ICSSCADA_Systems_with_Honeypots},
doi = {10.1109/CSR54599.2022.9850329},
isbn = {978-1-6654-9952-1},
year = {2022},
date = {2022-07-27},
booktitle = {2022 IEEE International Conference on Cyber Security and Resilience (CSR)},
pages = {345-350},
abstract = {Both signature-based and anomaly-based Intrusion Detection and Prevention System (IDPS) have already demonstrated their efficiency towards recognising and mitigating various intrusions. However, the first category cannot detect zero-day attacks, while the second one lacks the presence of appropriate datasets. Therefore, the presence of additional cybersecurity mechanisms is necessary, especially in the area of the Industrial Internet of Things (IIoT), including critical infrastructures, such as the smart electrical grid. Thus, honeypots are used to hide and protect critical assets. IEC 60870-5-104 (IEC104) is a widely used telemetry protocol in Industrial Control Systems (ICS)/Supervisory Control and Data Acquisition (SCADA). However, IEC104 lacks critical security features, such as encryption, integrity protection and authentication. This work presents the IEC104 honeypot, which is capable of hiding the actual IEC104 assets and detecting potential intrusions and anomalies. The experimental results demonstrate the effectiveness of our work.},
keywords = {Cybersecurity, Honeypots, ICS, SCADA},
pubstate = {published},
tppubtype = {conference}
}
Vasiliki Kelli; Panagiotis Radoglou-Grammatikis; Thomas Lagkas; Evangelos K Markakis; Panagiotis Sarigiannidis
Risk Analysis of DNP3 Attacks Conference
2022 IEEE International Conference on Cyber Security and Resilience (CSR), 2022, ISBN: 978-1-6654-9952-1.
Abstract | BibTeX | Tags: cyberattacks, Cybersecurity, DNP3, SCADA | Links:
@conference{9850291,
title = {Risk Analysis of DNP3 Attacks},
author = {Vasiliki Kelli and Panagiotis Radoglou-Grammatikis and Thomas Lagkas and Evangelos K Markakis and Panagiotis Sarigiannidis},
url = {https://www.researchgate.net/publication/362741509_Risk_Analysis_of_DNP3_Attacks},
doi = {10.1109/CSR54599.2022.9850291},
isbn = {978-1-6654-9952-1},
year = {2022},
date = {2022-07-27},
booktitle = {2022 IEEE International Conference on Cyber Security and Resilience (CSR)},
pages = {351-356},
abstract = {The integration of intelligent devices in the industry allows the automation and control of industrial processes, in an efficient and effective manner. Such systems have contributed to the rapid evolution of production infrastructures, increasing the reliability, reducing production costs, and automating the entire manufacturing operations. However, the utilization of intelligent devices has led to an increased attack surface in critical infrastructures, threatening to compromise regular operations. Attacks against such environments can have disastrous consequences in case their goal is achieved, due to the critical nature of such infrastructures. Thus, the timely identification of vulnerable spots through high-quality risk assessment, is considered highly important for avoiding or mitigating potential risks. In this paper, we focus on Distributed Network Protocol 3 (DNP3), a protocol with high utility in smart grids. Specifically, we investigate, identify and describe the vulnerabilities-by-design of DNP3 through 8 DNP3-centered cyberattacks. In addition, we present a novel method for conducting risk assessment, stemming from the combination of two techniques, namely, Attack Defence Trees (ADTs) and Common Vulnerability Scoring System v3.1 (CVSS). Through our proposed technique, the risk of a cyberattack occurring is calculated, thus contributing in securing the critical infrastructure.},
keywords = {cyberattacks, Cybersecurity, DNP3, SCADA},
pubstate = {published},
tppubtype = {conference}
}
George Amponis; Thomas Lagkas; Vasileios Argyriou; Ioannis Moscholios; Maria Zevgara; Savvas Ouzounidis; Panagiotis Sarigiannidis
Swarm Mobility Models and Impact of Link State Awareness in Ad Hoc Routing Conference
2022 13th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP), 2022, ISBN: 978-1-6654-1044-1.
Abstract | BibTeX | Tags: Ad Hoc Communications, Drone swarms, FANETs, Mobility Models | Links:
@conference{9907951,
title = {Swarm Mobility Models and Impact of Link State Awareness in Ad Hoc Routing},
author = {George Amponis and Thomas Lagkas and Vasileios Argyriou and Ioannis Moscholios and Maria Zevgara and Savvas Ouzounidis and Panagiotis Sarigiannidis},
doi = {10.1109/CSNDSP54353.2022.9907951},
isbn = {978-1-6654-1044-1},
year = {2022},
date = {2022-07-20},
booktitle = {2022 13th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP)},
pages = {762-767},
abstract = {With the development of new communication models and the establishment of next-generation cellular communications, new applications have been enabled and new communication requirements have emerged. Flying ad hoc networks are pivotal in supporting this technological leap, and as such, resorting to application- and mobility-aware routing is a promising enabler of this emerging set of use cases. This paper discusses matters of swarm mobility modelling, types of applicable routing protocols, whilst aiming to correlate channel link state awareness with quality of service in different mobility scenarios. The results of this paper will help formulate new methodologies and best practices for ad hoc routing protocols, considering computational and communication quality demands.},
keywords = {Ad Hoc Communications, Drone swarms, FANETs, Mobility Models},
pubstate = {published},
tppubtype = {conference}
}
Georgios Fevgas; Thomas Lagkas; Vasileios Argyriou; Panagiotis Sarigiannidis
UAV Energy Awareness based on Network Communication Optimization and Power Efficient Trajectories Conference
2022, ISBN: 978-1-6654-1044-1.
Abstract | BibTeX | Tags: Coverage Path Planning (CPP), Energy-Efficient CPP methods, Multiple UAVs Networks, Networks Energy Optimization, Unmanned Aerial Vehicles (UAVs) | Links:
@conference{inproceedingsd,
title = {UAV Energy Awareness based on Network Communication Optimization and Power Efficient Trajectories},
author = {Georgios Fevgas and Thomas Lagkas and Vasileios Argyriou and Panagiotis Sarigiannidis},
url = {https://www.researchgate.net/publication/364233835_UAV_Energy_Awareness_based_on_Network_Communication_Optimization_and_Power_Efficient_Trajectories},
doi = {10.1109/CSNDSP54353.2022.9907977},
isbn = {978-1-6654-1044-1},
year = {2022},
date = {2022-07-20},
pages = {756-761},
abstract = {The purpose of energy-efficient Coverage Path Planning (CPP) methods is to minimize energy consumption using multiple Unmanned Aerial Vehicles (UAVs) of the coverage area. In multiple UAVs systems, the network configuration plays a crucial role in the network’s survivability and mission execution. However, the network’s survivability and stability depend on the network’s resources optimization. This paper presents a review of single or multiple UAV energy-efficient CPP methods. Furthermore, we discuss the network configurations of multiple UAVs systems. Likewise, we aim to present networks’ energy optimization approaches and directions for future research.},
keywords = {Coverage Path Planning (CPP), Energy-Efficient CPP methods, Multiple UAVs Networks, Networks Energy Optimization, Unmanned Aerial Vehicles (UAVs)},
pubstate = {published},
tppubtype = {conference}
}
Dimitrios Pliatsios; Panagiotis Sarigiannidis; Thomas D Lagkas; Vasileios Argyriou; Alexandros-Apostolos A Boulogeorgos; Peristera Baziana
Joint Wireless Resource and Computation Offloading Optimization for Energy Efficient Internet of Vehicles Journal Article
In: IEEE Transactions on Green Communications and Networking, vol. 6, no. 3, pp. 1468-1480, 2022, ISSN: 2473-2400.
Abstract | BibTeX | Tags: 6G, B5G, block coordinate descent, Computation offloading | Links:
@article{9820768,
title = {Joint Wireless Resource and Computation Offloading Optimization for Energy Efficient Internet of Vehicles},
author = {Dimitrios Pliatsios and Panagiotis Sarigiannidis and Thomas D Lagkas and Vasileios Argyriou and Alexandros-Apostolos A Boulogeorgos and Peristera Baziana},
url = {https://www.researchgate.net/publication/361864374_Joint_Wireless_Resource_and_Computation_Offloading_Optimization_for_Energy_Efficient_Internet_of_Vehicles},
doi = {10.1109/TGCN.2022.3189413},
issn = {2473-2400},
year = {2022},
date = {2022-07-08},
journal = {IEEE Transactions on Green Communications and Networking},
volume = {6},
number = {3},
pages = {1468-1480},
abstract = {The Internet of Vehicles (IoV) is an emerging paradigm, which is expected to be an integral component of beyond-fifth-generation and sixth-generation mobile networks. However, the processing requirements and strict delay constraints of IoV applications pose a challenge to vehicle processing units. To this end, multi-access edge computing (MEC) can leverage the availability of computing resources at the edge of the network to meet the intensive computation demands. Nevertheless, the optimal allocation of computing resources is challenging due to the various parameters, such as the number of vehicles, the available resources, and the particular requirements of each task. In this work, we consider a network consisting of multiple vehicles connected to MEC-enabled roadside units (RSUs) and propose an approach that minimizes the total energy consumption of the system by jointly optimizing the task offloading decision, the allocation of power and bandwidth, and the assignment of tasks to MEC-enabled RSUs. Due to the original problem complexity, we decouple it into subproblems and we leverage the block coordinate descent method to iteratively optimize them. Finally, the numerical results demonstrate that the proposed solution can effectively minimize total energy consumption for various numbers of vehicles and MEC nodes while maintaining a low outage probability.},
keywords = {6G, B5G, block coordinate descent, Computation offloading},
pubstate = {published},
tppubtype = {article}
}
Address
Internet of Things and Applications Lab
Department of Electrical and Computer Engineering
University of Western Macedonia Campus
ZEP Area, Kozani 50100
Greece
Contact Information
tel: +30 2461 056527
Email: ithaca@uowm.gr