Alexios Lekidis

Alexios Lekidis
Verified
Alexios verified their affiliation via an institutional email.
Verified
Alexios verified their affiliation via an institutional email.
  • PhD in Theoretical Computer Science
  • Assistant Professor at University of Thessaly

About

68
Publications
51,052
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
754
Citations
Introduction
I am Assistant Professor in Intelligent Energy Systems at the University of Thessaly, Dpt of Energy Systems. I am specialized in the fields of smart meters, e-mobility, IoT, cyber-security, Renewable Energy Sources, 5G and Next Generation Networks. I am always open for research collaborations and opportunities while my background spans both in the academic and industrial sector. If you are interested to collaborate please contact me at alekidis@uth.gr.
Current institution
University of Thessaly
Current position
  • Assistant Professor
Additional affiliations
June 2012 - September 2015
Joseph Fourier University
Position
  • PhD Student
Description
  • Working on the ACOSE project, in order to develop a full-fledged design flow for sensor network applications based on BIP. BIP is a component framework based on Petri-Nets and Automata(http://www-verimag.imag.fr/BIP-Tools,93.html).
September 2011 - September 2012
Joseph Fourier University
Position
  • Engineer
Description
  • Industrial collaboration with Cyberio (industrial partners) in order to develop applications based on CANopen communications.
Education
September 2005 - July 2011
Aristotle University of Thessaloniki
Field of study
  • Electrical and Computer Engineering

Publications

Publications (68)
Article
Full-text available
The design of software for networked systems with nodes running an Internet of Things (IoT) operating system faces important challenges, due to the heterogeneity of interacting things and the constraints stemming from the often limited amount of available resources. In this context, it is hard to build confidence that a design solution fulfills the...
Conference Paper
Full-text available
Automotive systems are currently undergoing a rapid evolution through the integration of the Internet of Things (IoT) and Software Defined Networking (SDN) technologies. The main focus of this evolution is to improve the driving experience, including automated controls, intelligent navigation and safety systems. Moreover, the extremely rapid pace t...
Article
Full-text available
The Internet of Things (IoT) is an emerging technology that is revolutionizing the global economy and society. IoT enables a collaborative environment where different entities – devices, people and applications – exchange information for service provision. Despite the benefits that IoT technology brings to individuals, society and industry, its wid...
Conference Paper
Full-text available
Modern vehicles are complex safety critical cyber physical systems, that are connected to the outside world, with all security implications it brings. Different network intrusion detection systems (NIDSs) proposed for the CAN bus, the predominant type of in-vehicle network, to improve security are hard to compare due to disparate evaluation methods...
Article
Full-text available
The technological revolution brought by the Internet of Things (IoT) is characterized by a high level of automation based, to a large extent, on battery autonomy. Important risks hindering its wide adoption, though, are associated with device battery lifetime, which is affected by system design aspects such as connectivity, data processing and stor...
Chapter
Full-text available
The increased financial value of the power grids and the mul- titude of potential attackers, including such with advanced capabilities, makes the enhancement of cybersecurity in power grids very important. In order to strengthen the cybersecurity posture of the power grids, it is necessary to foster the development of cybersecurity skills and knowl...
Conference Paper
Elias και Daniel) για τις περ. 3000 γέφυρες και τεχνικά του δευτερεύοντος οδικού δικτύου-«παλαιού» εθνικού δικτύου της χώρας, που αποτελεί υποδομή εθνικής σημασίας. Για την αποκατάσταση και τη στοιχειώδη συντήρησή του, θα πρέπει γρήγορα με μεθοδικότητα και οικονομικότητα λόγω των τεραστίων απαιτήσεων ενός επί της ουσίας εγκαταλειμμένου δικτύου, να...
Article
Full-text available
An increasing adoption of electric vehicles (EVs) is expected in the coming decades mainly due to the need to achieve carbon neutrality until 2050. However, predicting electric mobility’s future is challenging due to three main factors: technological advancements, regulatory policies, and consumer behaviour. The projections presented in this study...
Preprint
Full-text available
The contemporary era is marked by rapid urban growth and increasing population. A significant, and constantly growing, portion of the global population now resides in major cities, leading to escalating energy demands in urban centers. As urban population is expected to keep on expanding in the near future, the same is also expected to happen with...
Conference Paper
Full-text available
Modern V2X systems have an increasing number of interfaces that allow remote connectivity but also include the risk of exposure to cyber threats. Hence, the attack surface for such threats is constantly increasing, and combined with privacy issues that may arise through the presence of sensitive user data in the V2X ecosystem, this necessitates the...
Conference Paper
Full-text available
Vehicle-to-Everything (V2X) technologies have been recently introduced to provide enhanced connectivity between the different smart grid segments as well as Electric Vehicles (EVs). The EVs draw power to the grid and may be used as an energy flexibility resource for households and buildings. The increased number of interconnections though, is augme...
Conference Paper
Full-text available
The sixth generation of telecommunication networks (6G) offers even faster data rates, lower latency, greater reliability, and higher device density than the currently available 5G infrastructure. Nevertheless, simultaneously these advancements include several challenges in different domains, slowing substantially the transition to it. Hence, 3GPP...
Conference Paper
Full-text available
The Electric Vehicle (EV) grid integration opens up a new dynamic market in the Greek area that is expected to experience rapid growth in the coming years. During the first years of its introduction though, it has provided initial insights into the operation of EV charging stations, and compliance with charging protocols as well as faced challenges...
Article
Full-text available
The energy carrier infrastructure, including both electricity and natural gas sources, has evolved and begun functioning independently over recent years. Nevertheless, recent studies are pivoting toward the exploration of a unified architecture for energy systems that combines Multiple-Energy Carriers into a single network, hence moving away from t...
Conference Paper
Full-text available
The threat landscape of industrial infrastructures has expanded exponentially over the last few years. Such infrastructures include services such as the smart meter data exchange that should have real-time availability. Smart meters constitute the main component of the Advanced Metering Infrastructure, and their measurements are also used as histor...
Article
Full-text available
The scheduled maintenance of industrial equipment is usually performed with a low frequency, as it usually leads to unpredicted downtime in business operations. Nevertheless, this confers a risk of failure in individual modules of the equipment, which may diminish its performance or even lead to its breakdown, rendering it non-operational. Lately,...
Conference Paper
Full-text available
Advanced Metering Infrastructure (AMI) systems constitute a vital part for the interconnection of the electrical grid towards enabling the smart grid area. They enable real-time electrical measurement exchange through a utility platform, in order to activate billing and load demand forecasting processes. However, the cyber-attack surface of such sy...
Conference Paper
Full-text available
The Advanced Metering Infrastructure (AMI) is lately introduced to ensure the real-time exchange of smart meter measurements and their availability for both utilities as well as their customers. DLMS/COSEM is the mostly used protocol for AMI systems as well as allows the integration in 5G-enabled network slices to increase the reliability of energy...
Conference Paper
Full-text available
Demand Response (DR) has been proposed and implemented in recent years to enable the participation of active consumers in energy management. However, existing programs do not consider the characteristics and opportunities introduced by electric vehicles (EVs). EVs have more flexibility than traditional loads and can be used as battery energy storag...
Conference Paper
Full-text available
The electrical grid has significantly evolved over the years, thus creating a smart paradigm, which is well known as the smart electrical grid. However, this evolution creates critical cybersecurity risks due to the vulnerable nature of the industrial systems and the involvement of new technologies. Therefore, in this paper, the ELECTRON architectu...
Preprint
Full-text available
As the demands in reliability and high-degree of automation in industrial applications are increasing exponentially, the current Industry 4.0 trend lies in migrating towards smarter technologies that increase flexibility and provide autonomous operation. To tackle this, manufacturers shifted towards Real-Time Ethernet communication which supports a...
Article
Full-text available
In this article, an extended stochastic multiobjective economic dispatch model is introduced with the goal of utilizing optimally, the heat and power production capabilities of two (2) Combined Heat and Power (CHP) units, assuming a non-convex Feasible Operation Region (FOR), along with the safe incorporation of wind power. Additionally, the effect...
Article
Full-text available
Adversarial Machine Learning (AML) is a recently introduced technique, aiming to deceive Machine Learning (ML) models by providing falsified inputs to render those models ineffective. Consequently, most researchers focus on detecting new AML attacks that can undermine existing ML infrastructures, overlooking at the same time the significance of def...
Article
Full-text available
The electrical grid is gradually transitioning towards being an interconnected area of the smart grid, where embedded devices operate in an autonomous manner without any human intervention. An important element for this transition is the energy demand prediction, since the needs for energy have substantially increased due to the introduction of new...
Preprint
Full-text available
As digital technologies become more pervasive in society and the economy, cybersecurity incidents become more frequent and impactful. According to the NIS and NIS2 Directives, EU Member States and their Operators of Essential Services must establish a minimum baseline set of cybersecurity capabilities and engage in cross-border coordination and coo...
Article
Full-text available
The exponential increase in the number of wires needed for the deployment of industrial applications in production lines combined with the complexity of the application development using proprietary protocols, shifted manufacturers towards new directions. One such direction that is also reducing the system configuration and maintenance cost is the...
Article
Full-text available
The opportunities created in the Greek electric vehicle (EV) market have allowed potential investors to participate in the development of the EV charging infrastructure of the country. Yet, the decision process of relevant stakeholders for strategic investments is challenging, involving the identification of the most promising charging sites from a...
Preprint
Full-text available
The electrical grid constitutes of legacy systems that were built with no security in mind. As we move towards the Industry 4.0 area though a high-degree of automation and connectivity provides: 1) fast and flexible configuration and updates as well as 2) easier maintenance and handling of misconfigurations and operational errors. Even though consi...
Article
Full-text available
Electricity infrastructures include assets that require frequent maintenance, as they are exposed into heavy use, in order to produce energy that satisfies customer demands. Such maintenance is currently performed by specialized personnel that is scaffolding to spot damages or malfunctioning equipment. Scaffolding is time-consuming and incurs accid...
Article
Full-text available
The electric vehicle (EV) industry has made significant progress but, in many markets, there are still barriers holding back its advancement. A key issue is the anxiety caused to the drivers by the limited range of current EV models and the inadequate access to charging stations in long-distance trips, as is the case on highways. We propose an intu...
Article
Full-text available
Traditional electricity infrastructure inspections usually have high costs, risks and it takes a long time for specialized personnel to carry them out. Additionally, they also involve scaffolding risks, that lead to a high accident rate in most electricity companies. The recent emergence of Unmanned Aerial Vehicles (UAVs) is gradually leveraged to...
Conference Paper
Full-text available
Predictive Maintenance in critical infrastructure is a fundamental tool for predicting a failure in advance and for avoiding catastrophic equipment damage that can be prevented and the time-consuming repair scheduling can be executed in time. Artificial Intelligence (AI) based predictive maintenance utilises intelligent data for accurate prediction...
Preprint
Full-text available
Electricity infrastructures include assets that require frequent maintenance, as they are exposed into heavy use, in order to produce energy that satisfies customer demands. Such maintenance is currently performed by specialized personnel that is scaffolding to spot damages or malfunctioning equipment. Scaffolding is time-consuming and incurs accid...
Conference Paper
Full-text available
The recent technological advance in the fifth generation of telecom- munication networks (5G) has led to a evolutions in many domains, including connected cars, manufacturing and electricity. A tech- nological domain that had large benefits from this advance is the Electrical Power and Energy System (EPES). Despite the simplicity and efficiency tha...
Article
Full-text available
With the expansion of 5G networks, new business models are arising where multi-tenancy and active infrastructure sharing will be key enablers for them. With these new opportunities, new security risks are appearing in the form of a complex and evolving threat landscape for 5G networks, being one of the main challenges for the 5G mass rollout. In 5G...
Chapter
Full-text available
With the deployment of 5G networks and the beginning of the design of beyond 5G communications, new critical requirements are emerging in terms of performance, security, and trust for leveraged technologies, such as Software Defined Networking (SDN) and Network Function Virtualization (NFV). One of the requirements at the security and trust level i...
Conference Paper
Full-text available
The inclusion of resource sharing schemes within Network Function Virtualization (NFV) ecosystems allows for optimized usage of 5G infrastructure and extended capabilities of network slicing services. In such environments, marketplaces are formed to facilitate the exchange of NFV services across administrative domains, which may, however, belong to...
Conference Paper
Full-text available
A recently proposed direction that is pursued by standardization organizations for 5G Network Function Virtualization (NFV) technologies at the core of next-generation works (5G and beyond) is the adoption of “Cloud-native” design principles. These principles are catalyzed by Platform as a Service (PaaS) solutions that allow re-usability of common...
Conference Paper
Full-text available
Railway transportation dynamically performs under complex coherent systems and fail-safe interlocking conditions. Security and safety are the first priorities of this massive intermodal transportation. However, railway systems, like any other critical infrastructure, face many threats that can take not only the form of physical, but may also be cyb...
Technical Report
Full-text available
This white paper on AI and ML as enablers of beyond 5G (B5G) networks is based on contributions from 5G PPP projects that research, implement and validate 5G and B5G network systems. The white paper introduces the main relevant mechanisms in Artificial Intelligence (AI) and Machine Learning (ML), currently investigated and exploited for 5G and B5G...
Preprint
Full-text available
The fifth generation (5G) of mobile networks is steering the technological evolution of many application domains , including many demanding automotive scenarios, such as platooning. Such evolution combines softwarization enablers (e.g., Network Function Virtualization (NFV) and Software-Defined Networking (SDN)) with Cellular Vehicle-to-Everything...
Chapter
Full-text available
Connectivity is the one word summary for Industry 4.0 revolution. The importance of Internet of Things (IoT) and Industrial IoT (IIoT) have been increased dramatically with the rise of industrialization and industry 4.0. As new opportunities bring their own challenges, with the massive interconnected devices of the IIoT, cyber security of those net...
Conference Paper
Full-text available
Smart grids are a promising upgrade to legacy power grids due to enhanced cooperation of involved parties, such as consumers and utility providers. These newer grids improve the efficiency of electricity generation and distribution by leveraging communication networks to exchange information between those different parties. However, the increased c...
Article
Full-text available
The advances towards IoT systems with increased autonomy support improvements to existing applications and open new perspectives for other application domains. However, the design of IoT systems is challenging, due to the multiple design aspects that need to be considered. Connectivity and storage aspects are amongst the most significant ones, as I...
Conference Paper
Full-text available
Modern vehicles are complex safety critical cyber physical systems, that are connected to the outside world, with all security implications that brings. To enhance vehicle security several network intrusion detection systems (NIDS) have been proposed for the CAN bus, the predominant type of in-vehicle network. The in-vehicle CAN bus, however, is a...
Preprint
Full-text available
Modern vehicles are complex safety critical cyber physical systems, that are connected to the outside world, with all security implications that brings. To enhance vehicle security several network intrusion detection systems (NIDS) have been proposed for the CAN bus, the predominant type of in-vehicle network. The in-vehicle CAN bus, however, is a...
Chapter
Full-text available
The advances towards IoT systems with increased autonomy support improvements to existing applications and open new perspectives for other application domains. However, the design of IoT systems is challenging, due to the multiple design aspects that need to be considered. Connectivity and storage aspects are amongst the most significant ones, as I...
Preprint
Full-text available
A major challenge that is currently faced in the design of applications for the Internet of Things (IoT) concerns with the optimal use of available energy resources given the battery lifetime of the IoT devices. The challenge is derived from the heterogeneity of the devices, in terms of their hardware and the provided functionalities (e.g data proc...
Article
Full-text available
A major challenge that is currently faced in the design of applications for the Internet of Things (IoT) concerns with the optimal use of available energy resources given the battery lifetime of the IoT devices. The challenge is derived from the heterogeneity of the devices, in terms of their hardware and the provided functionalities (e.g data proc...
Data
A major challenge that is currently faced in the design of applications for the Internet of Things (IoT) concerns with the optimal use of available energy resources given the battery lifetime of the IoT devices. The challenge is derived from the heterogeneity of the devices, in terms of their hardware and the provided functionalities (e.g data proc...
Conference Paper
Full-text available
A major challenge that is currently faced in the design of applications for the Internet of Things (IoT) concerns with the optimal use of available energy resources given the battery lifetime of the IoT devices. The challenge is derived from the heterogeneity of the devices, in terms of their hardware and the provided functionalities (e.g data proc...
Thesis
Full-text available
Networked embedded systems have emerged as a major technological advance over the last years. Since they are used in a vast variety of applications, the main arising challenge is to develop functional applications whilst ensuring their design challenges. These challenges relate to the limited hardware resources (e.g. processor memory, power unit) a...
Conference Paper
Full-text available
Internet of Things (IoT) systems process and respond to multiple (external) events, while performing computations for a Sense-Compute-Control (SCC) or a Sense-Only (SO) goal. Given the limitations of the interconnected resource-constrained devices, the execution environment can be based on an appropriate operating system for the IoT. The developmen...
Conference Paper
Full-text available
The exponential increase in the demands for the deployment of large-scale sensor networks, makes necessary the efficient development of functional applications. Nevertheless, the existence of scarce resources and the derived application complexity, impose significant constraints and require high design expertise. Consequently, the probability of di...
Technical Report
Full-text available
The exponential increase in the demands for the deployment of large-scale sensor networks,makes necessary the efficient development of functional applications. Nevertheless, the existence of scarce resources and the derived application complexity, impose significant issues and require high design expertise. Consequently, the probability of discover...
Conference Paper
Full-text available
CANopen is an increasingly popular protocol for the design of networked embedded systems. Nonetheless, the large variety of communication and network management functionalities supported in CANopen can increase significantly systems complexity and in turn, the needs for system validation at design time. We present hereafter a rigorous method based...
Technical Report
Full-text available
CANopen is an increasingly popular protocol for the design of networked embedded systems. Nonetheless, the large variety of communication and network management functionalities supported in it can increase significantly systems complexity and in turn, the needs for system validation at design time. We present hereafter a novel approach relying on m...
Conference Paper
Full-text available
This paper introduces a novel approach for systematical development of CAN-based systems with guaranteed functional correctness and optimal performance. This approach relies on formal methods for faithful modeling and analysis of such systems, whilst taking into consideration the effects of critical parameters, such as bit stuffing and buffer utili...

Network

Cited By