Nikolaos Petroulakis

Nikolaos Petroulakis
Foundation for Research and Technology - Hellas | forth · Institute of Computer Science (ICS)

About

46
Publications
9,082
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
406
Citations

Publications

Publications (46)
Chapter
Full-text available
The orchestration of heterogeneous IoT devices to enable the provision of IoT applications and services poses numerous challenges, especially in contexts where end-to-end security and privacy guarantees are needed. To tackle these challenges, this paper presents a pattern–driven approach for interacting with IoT systems, whereby the required proper...
Article
The increase in the world's population has led to a massive rise in human consumption of the planet's natural resources, well beyond their replacement rate. Traditional recycling concepts and methods are not enough to counter such effects. In this context, a circular economy (CE), that is, a restorative and regenerative by-design economy, can refor...
Conference Paper
The advent of the Internet of Things opens a plethora of possibilities, provided the research and industry com- munities are able to overcome a number of challenges such as the dynamicity, scalability, heterogeneity and end-to-end security and privacy requirements of such environments. Motivated by these challenges, this paper proposes leveraging a...
Chapter
The innovative capabilities of 5G technologies, such as software‐defined networking (SDN) and network function virtualization (NFV), open up a variety of possibilities for improved and novel service provisioning. Nevertheless, technologies such as SDN expand the attack surface of the communication infrastructure, thus necessitating the introduction...
Conference Paper
Full-text available
Nowadays, more-and-more aspects of our daily activities are digitalized. Data and assets in the cyber-space, both for individuals and organizations, must be safeguarded. Thus, the insurance sector must face the challenge of digital transformation in the 5G era with the right set of tools. In this paper, we present CyberSure-an insurance framework f...
Conference Paper
Full-text available
Semantic interoperability is the designed property where various systems can interact with each other and exchange data with unambiguous, shared meaning. This enables knowledge discovery, machine computable reasoning and federation of different information systems. Traditionally, technologies from the Semantic Web are adapted in order to capture th...
Preprint
Full-text available
Reflecting upon the sustainability challenges cities will be facing in the near future and the recent technological developments allowing cities to become "smart", we introduce IDEAL-CITIES; a framework aiming to provide an architecture for cyber-physical systems to deliver a data-driven Circular Economy model in a city context. In the IDEAL-CITIES...
Conference Paper
Full-text available
Next generation networks, as the Internet of Things (IoT), aim to create open and global networks for connecting smart objects, network elements, applications, web services and end-users. Research and industry attempt to integrate this evolving technology and the exponential growth of IoT by overcoming significant hurdles such as dynamicity, scalab...
Conference Paper
Full-text available
The vast amount of connected devices on the Internet of Things (IoT) creates an enormous potential for new applications, by leveraging synergies arising through the convergence of consumer, business and industrial Internet, and creating open, global networks connecting people, data, and "things". In this context, the SEMIoTICS project aims to devel...
Conference Paper
Internet-of-Things (IoT) aims at interconnecting thousands or millions of smart objects/devices in a seamless way by sensing, processing and analyzing huge amount of data obtained from heterogeneous IoT devices. This rapid development of IoT-oriented infrastructures comes at the cost of increased security threats through IoT-based botnet attacks. I...
Article
Full-text available
Wind energy is one of the most attractive and one of the fastest growing sources of green energy in the world. With the expansion of wind parks, there is a growing need for an efficient coordination of the diverse energy production systems, as well as a tighter coupling between the production and the consumer side of the grid. Current grid operator...
Conference Paper
Full-text available
A popular application of ambient intelligence systems constitutes of assisting living services on smart buildings. As intelligence is imported in embedded equipment the system becomes able to provide smart services (e.g. control lights, airconditioning, provide energy management services etc.). IoT is the main enabler of such environments. However,...
Chapter
Full-text available
VirtuWind proposes the application of Software Defined Networking (SDN) and Network Functions Virtualization (NFV) in critical infrastructure networks. We aim at introducing network programmability, reconfigurability and multi-tenant capability both inside isolated and inter-connected industrial networks. Henceforth, we present the design of the Vi...
Article
Full-text available
The innovative application of 5G core technologies, namely Software Defined Networking (SDN) and Network Function Virtualization (NFV), can help reduce capital and operational expenditures in industrial networks. Nevertheless, SDN expands the attack surface of the communication infrastructure, thus necessitating the introduction of additional secur...
Conference Paper
Full-text available
The innovative application of 5G core technologies, namely Software Defined Networking (SDN) and Network Function Virtualization (NFV), can help reduce capital and operational expenditures in industrial networks. Nevertheless, SDN expands the attack surface of the communication infrastructure, thus necessitating the introduction of additional secur...
Article
In an interconnected world, cyber and physical networks face a number of challenges that need to be resolved. These challenges are mainly due to the nature and complexity of interconnected systems and networks and their ability to support heterogeneous physical and cyber components simultaneously. The construction of complex networks preserving Sec...
Technical Report
Full-text available
5G represents the next major phase of mobile telecommunication systems and network architectures beyond the current 4G standards, aiming at extreme broadband and ultra-robust, low latency connectivity, to enable the programmable connectivity for the Internet of Everything2. Despite the significant debate on the technical specifications and the tech...
Conference Paper
Full-text available
In an Emergency and/or Crisis Situations (ECS) like earthquakes, floods, tsunamis, fires, terrorist attacks etc. the adequate operation of communication services is of extreme importance. History has shown that poor communication in such cases resulted in several casualties. In ECS fixed communication infrastructure might be unserviceable due to su...
Conference Paper
Early Warning Intrusion Detection System (EWIS) is a distributed global scoped Internet threat monitoring system with the potential of detecting large scale malicious events as early as possible. The system’s architecture includes a network of distributed low-interaction sensors and a central server [1]. The sensors are small computing platforms [2...
Conference Paper
Full-text available
In emergency and crisis situations (ECS) like earthquakes, tsunamis, terrorist attacks, it is very important that communication facilities are operative to provide services both to rescue teams and civilians. In ECS it is very common that communication premises are often unable to provide services, either due to physical damages or traffic overload...
Conference Paper
Full-text available
In an interconnected cyber-world, Cyber-Physical Systems (CPSs) appear to play an increasingly important role in smart ecosystems. A variety of resource-constrained thin clients, such as sensors, RFIDs, actuators and smart devices, are included in the list of CPS. These devices can be used in a number of medical, vehicular, aviation, military and s...
Article
As the world becomes an interconnected network where objects and humans interact with each other, new challenges and threats appear in the ecosystem. In this interconnected world, smart objects have an important role in giving users the chance for life-logging in smart environments. However, smart devices have several limitations with regards to me...
Article
We present intrusion detection algorithms to detect physical layer jamming attacks in wireless networks. We compare the performance of local algorithms on the basis of the signal-to-interference-plus-noise ratio (SINR) executing independently at several monitors, with a collaborative detection algorithm that fuses the outputs provided by these algo...
Article
Full-text available
In a smart world, smart objects will play an im-portant role giving users the chance for life-logging in smart environments. However, the limitations of smart devices with regard to memory, resources and computation power bring a variety of security challenges and constraints. One of the most important constraints is the consumed energy. In order t...
Article
Full-text available
Wireless mesh networks comprise nodes with multiple radio interfaces, and can provide low-cost high-speed Internet access or connectivity for data transfer. In this article we report our experiences and investigations with an experimental metropolitan multiradio mesh network that covers an area of approximately 60 km2 in the city of Heraklion, Cret...
Conference Paper
Full-text available
As the world becomes an interconnected network in which objects and humans interact, new challenges and threats appear. In this interconnected world, smart objects seam to have an important role in giving users the chance for life-logging in smart environments. However, the limitation of smart devices with regard to memory, resources and computatio...
Conference Paper
Full-text available
In this paper we present and evaluate anomaly-based intrusion detection algorithms for detecting physical layer jamming attacks in wireless networks, by seeking changes in the statistical characteristics of the signal-to-noise ratio (SNR). Two types of algorithms are investigated: simple threshold algorithms and algorithms based on the cumulative s...
Conference Paper
Full-text available
We demonstrate the channel assignment in a metropolitan wireless multi-radio mesh network with directional antennas. A channel assignment approach is presented using suitable algorithms with key components the interference model, the link ordering and the channel selection metric. We have implemented and evaluated the proposed channel assignment in...
Conference Paper
Full-text available
We present a system for real-time collection of electromagnetic field (EMF) measurements. The two innovative features of the system that differentiate it from other similar monitoring systems are the use of a low-cost EMF measurement device and the collection and access of measurements through a metropolitan wireless mesh network. The low-cost EMF...
Article
Full-text available
We present our experiences and investigations with an ex-perimental metropolitan multi-radio mesh network that cov-ers an area of approximately 60 Km 2 in the city of Heraklion, Crete. The network consists of 14 nodes, among which six are core nodes with up to four 802.11a wireless interfaces each, and an additional wireless interface for managemen...
Article
Full-text available
We present the design and initial experience from an exper-imental metropolitan multi-radio mesh network that covers an area of approximately 60 Km 2 in the city of Heraklion, Crete. The network consists of 14 nodes, among which six are core nodes with up to four 802.11a wireless interfaces each, and one wireless interface for management and mon-it...

Network

Cited By

Projects

Projects (3)
Project
The overall aim of CE-IoT is to develop an innovative framework of interplay between Circular Economy and IoT. Our vision blends the paradigm of Circular Economy and Internet of Things to explore novel ways in which this interaction can drastically change the nature of products, services, business models and ecosystems. https://www.ce-iot.eu/
Project
VirtuWind will develop and demonstrate SDN & NFV ecosystem, based on open, modular and secure framework showcasing a prototype for intra-domain and interdomain scenarios in real wind parks as a representative use case of industrial networks, and validate the economic viability of the demonstrated solution. The wind park control network has been chosen as a professional application in VirtuWind as wind energy has now established itself as a mainstream of sustainable energy generation. By envisioning lower capital expenditure and operational expenditure costs in control network infrastructure, VirtuWind will play important role in assisting wind energy sector to achieve cost reductions. Further applicability of VirtuWind solution in other industrial domains will bring multifold benefits in their communication networks.