Panagiotis Radoglou Grammatikis

Panagiotis Radoglou Grammatikis
University of Western Macedonia | UOWM · Department of Electrical and Computer Engineering

Diploma (MEng, 5 years)

About

39
Publications
21,504
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
711
Citations
Introduction
Panagiotis Radoglou Grammatikis received the Diploma degree (MEng, 5 years) from the Dept. of Informatics and Telecommunications Eng., Faculty of Engineering, University of Western Macedonia, Greece, in 2016. He is now a Ph.D. candidate and research associate in the same department. His main research interests are in the area of cybersecurity and mainly focus on intrusion detection, vulnerability research and applied cryptography.
Additional affiliations
May 2018 - present
University of Western Macedonia
Position
  • Research Associate
Education
February 2017 - February 2023
University of Western Macedonia
Field of study
  • Security and Privacy in the Internet of Things
October 2011 - November 2016
University of Western Macedonia
Field of study
  • Informatics and Telecommunications Engineering

Publications

Publications (39)
Article
Full-text available
The smart grid provides advanced functionalities, including real-time monitoring, dynamic energy management, advanced pricing mechanisms, and self-healing, by enabling the two-way flow of power and data, as well as the use of Internet of Things (IoT) technologies and devices. However, converting the traditional power grids to smart grids poses seve...
Article
Full-text available
The technological leap of smart technologies has brought the conventional electrical grid in a new digital era called Smart Grid (SG), providing multiple benefits, such as two-way communication, pervasive control and self-healing. However, this new reality generates significant cybersecurity risks due to the heterogeneous and insecure nature of SG....
Article
Full-text available
The interconnected and heterogeneous nature of the next-generation Electrical Grid (EG), widely known as Smart Grid (SG), bring severe cybersecurity and privacy risks that can also raise domino effects against other Critical Infrastructures (CIs). In this paper, we present an Intrusion Detection System (IDS) specially designed for the SG environmen...
Article
Full-text available
The rise of the Internet of Medical Things (IoMT) introduces the healthcare ecosystem in a new digital era withmultiple benefits, such as remote medical assistance, real-time monitoring and pervasive control. However, despite the valuable healthcare services, this progression raises significant cybersecurity and privacy concerns. In this paper, we...
Article
Full-text available
The progression of Software Defined Networking (SDN) and the virtualisation technologies lead to the beyond 5G era, providing multiple benefits in the smart economies. However, despite the advantages, security issues still remain. In particular, SDN/NFV and cloud/edge computing are related to various security issues. Moreover, due to the wireless n...
Conference Paper
Full-text available
The digitisation of the typical electrical grid introduces valuable services, such as pervasive control, remote monitoring and self-healing. However, despite the benefits, cybersecurity and privacy issues can result in devastating effects or even fatal accidents, given the interdependence between the energy sector and other critical infrastructures...
Preprint
The modern communications landscape requires reliable, high-speed, high- throughput and secure links and sessions between user equipment instances and the data network. The 5G core implements the newly defined 3GPP network ar- chitecture enabling faster connectivity, low latency, higher bit rates and network reliability. The full potential of this...
Article
Full-text available
Cybersecurity concerns have been at the forefront of regulatory reform in the European Union (EU) recently. One of the outcomes of these reforms is the introduction of certification schemes for information and communication technology (ICT) products, services and processes, as well as for data processing operations concerning personal data. These s...
Article
Full-text available
In the era of digital economies, the smart electrical grid has provided numerous benefits, such as two-way communication, pervasive control and self-healing. However, this evolution raises severe cybersecurity and privacy risks that can lead to disastrous effects. False data injection attacks, large-scale denial of service and unauthorised access r...
Article
Full-text available
The technological leap of smart technologies and the Internet of Things has advanced the conventional model of the electrical power and energy systems into a new digital era, widely known as the Smart Grid. The advent of Smart Grids provides multiple benefits, such as self-monitoring, self-healing and pervasive control. However, it also raises cruc...
Research
Full-text available
This Special Issue will cover a wide range of IIoT cybersecurity and privacy solutions, combining a plethora of emerging technologies. Please find more information at the following link: https://www.mdpi.com/journal/electronics/special_issues/Cybersecurity_Next_Generation
Conference Paper
Full-text available
The rise of the Industrial Internet of Things (IIoT) plays a crucial role in the era of hyper-connected digital economies. Despite the valuable benefits, such as increased resiliency, self-monitoring and pervasive control, IIoT raises severe cybersecurity and privacy risks, allowing cyberattackers to exploit a plethora of vulnerabilities and weakne...
Article
Full-text available
The rapid evolution of the smart technologies has digitised the electrical grid into a new paradigm called smart grid (SG). Despite the multiple benefits, this reality raises severe cybersecurity concerns. SPEAR provides a global cybersecurity solution, which (a) detects SG-related cyberthreats, (b) provides an advanced forensic readiness framework...
Chapter
The rise of the Information and Communication Technology (ICT) and especially of the Internet of things (IoT) introduces significant benefits in multiple aspects of the human ecosystem, such as health, energy, transport, and commerce. Despite the provided social and economic advances offered by this new reality, new cyber-security risks related to...
Conference Paper
Full-text available
The rapid evolution of the Internet of Medical Things (IoMT) introduces the healthcare ecosystem into a new reality consisting of smart medical devices and applications that provide multiple benefits, such as remote medical assistance, timely administration of medication, real-time monitoring, preventive care and health education. However, despite...
Conference Paper
Full-text available
The transformation of the conventional electricity grid into a new paradigm called smart grid demands the appropriate cybersecurity solutions. In this paper, we focus on the security of the IEC 60870-5-104 (IEC-104) protocol which is commonly used by Supervisory Control and Data Acquisition (SCADA) systems in the energy domain. In particular, after...
Conference Paper
Full-text available
Supervisory Control and Data Acquisition (SCADA) systems play a significant role in Critical Infrastructures (CIs) since they monitor and control the automation processes of the industrial equipment. However, SCADA relies on vulnerable communication protocols without any cybersecurity mechanism, thereby making it possible to endanger the overall op...
Article
Full-text available
The advent of the Smart Grid (SG) raises severe cybersecurity risks that can lead to devastating consequences. In this paper, we present a novel anomaly-based Intrusion Detection System (IDS), called ARIES (smArt gRid Intrusion dEtection System), which is capable of protecting efficiently SG communications. ARIES combines three detection layers tha...
Conference Paper
Full-text available
In this paper, an Intrusion Detection and Prevention System (IDPS) for the Distributed Network Protocol 3 (DNP3) Supervisory Control and Data Acquisition (SCADA) systems is presented. The proposed IDPS is called DIDEROT (Dnp3 Intrusion DetEction pReventiOn sysTem) and relies on both supervised Machine Learning (ML) and unsupervised/outlier ML detec...
Article
Full-text available
Climate change has introduced significant challenges that can affect multiple sectors, including the agricultural one. In particular, according to the Food and Agriculture Organization of the United Nations (FAO) and the International Telecommunication Union (ITU), the world population has to find new solutions to increase the food production by 70...
Conference Paper
Full-text available
With the rapid progression of Information and Communication Technology (ICT) and especially of Internet of Things (IoT), the conventional electrical grid is transformed into a new intelligent paradigm, known as Smart Grid (SG), providing significant benefits both for utility companies and energy consumers such as the two-way communication (both ele...
Conference Paper
Full-text available
The rapid evolution of the Information and Communications Technology (ICT) services transforms the conventional electrical grid into a new paradigm called Smart Grid (SG). Even though SG brings significant improvements, such as increased reliability and better energy management, it also introduces multiple security challenges. One of the main reaso...
Article
Full-text available
The Smart Grid (SG) paradigm is the next technological leap of the conventional electrical grid, contributing to the protection of the physical environment and providing multiple advantages such as increased reliability, better service quality, as well as efficient utilisation of the existing infrastructure and the renewable energy resources. Howev...
Article
Full-text available
The Internet of Things (IoT) is the next technological leap that will introduce significant improvements to various aspects of the human environment, such as among others health, commerce, and transport. However, despite the fact that it may bring beneficial economic and social changes, the implementation of such a system poses many challenges and...
Conference Paper
Full-text available
The Smart Grid (SG) paradigm constitutes the new technological evolution of the traditional electrical grid, providing remote monitoring and controlling capabilities among all its operations through computing services. These new capabilities offer a lot of benefits, such as better energy management, increased reliability and security, as well as mo...
Conference Paper
Full-text available
The multiple interconnections and the heterogeneity of the devices and technologies into the Smart Grid (SG) generate possible cyber-physical security vulnerabilities that can be exploited by various cyberattackers. The cyberattacks in SG, usually target the availability and the information integrity of the systems. Replay attacks, Denial of Servic...
Conference Paper
Full-text available
The penetration of the modern mobile devices is progressively gaining ground in today’s cognitive applications and services. Several applications have become part of the smartphone capabilities such as e-mail monitoring, Internet browsing, social networks activities, etc. However, the increased computation and storage capabilities of smartphones ha...
Conference Paper
Full-text available
The number of high performance embedded systems that are used for multimedia applications, like video encoding or decoding, has erupted. A key component in video encoding is the motion estimation, which exhibits high computational complexity and hard to meet deadlines. The most popular technique for motion estimation is block matching. The hierarch...

Network

Cited By

Projects

Projects (5)
Project
The vision of TERMINET is to provide a novel next generation reference architecture based on cutting-edge technologies such as SDN, multiple-access edge computing, and virtualisation for next generation IoT, while introducing new, intelligent IoT devices for low-latency, market-oriented use cases. TERMINET’s primary intention is to bring (more efficient and accurate) decisions to the point of interest to better serve the final user targeting at applying distributed AI at the edge by using accelerated hardware and sophisticated software to support local AI model training using federated learning. Our solution aspires to reduce the complexity of the connecting vast number of heterogeneous devices through a flexible SDN-enabled middleware layer. It also aims to design, develop, and integrate novel, intelligent IoT devices such as smart glasses, haptic devices, energy harvesting modules, smart animal monitoring collars, AR/VR environments, and autonomous drones, to support new market-oriented use cases. Great expectation of the proposal is to foster AR/VR contextual computing by demonstrating applicable results in realistic use cases by using cutting-edge IoT-enabled AR/VR applications. By designing and implementing an IoT-driven decentralised and distributed blockchain framework within manufacturing, TERMINET aims to support maintenance and supply chain optimisation. Our solution intends to apply a vertical security by design methodology by meeting the privacy-preserving and trust requirements of the NG-IoT architecture. To foster standardisation activities for the IoT ecosystem, TERMINET will provide novel disruptive business models. For the evaluation of its wide applicability, TERMINET will validate and demonstrate six proof-of-concept, realistic use cases in compelling IoT domains such as the energy, smart buildings, smart farming, healthcare, and manufacturing.
Project
Report novel scientific results. technological advances and applications in the multidisciplinary areas of image processing and machine vision.
Project
SDN-microSENSE aims at providing and demonstrating a secure, resilient to cyber-attacks, privacy-enabled, and protected against data breaches solution for decentralised Electrical Power and Energy Systems (EPES). The project employs a set of advanced cutting-edge technologies targeting at: (a) Performing collaborative and distributed risk assessment involving all energy actors, (b) Strengthening EPES domains with self-healing capabilities based on islanding and fast grid recovery processes exploiting renewable sources, (c) Enabling effective energy exchange between microgrids and residential prosumers, (d) Implementing a large-scale cybersecurity solution by integrating innovative components for detecting and preventing cyberattacks, privacy violations and various threats, (e) Building a centralised security information and event management (SIEM) tool for decision support concerning anomaly detection and response enhanced with advanced machine learning capabilities, (f) Realising an end-to-end privacy framework that involves all types of users and stakeholders to protect against data breaches, (g) Demonstrating and validating all tools/systems/processes through detailed real-world scenarios with emulated/simulated cyberattacks, and (h) Contributing to international standardisation activities for promoting sustainable and compatible EPES cybersecurity approaches. All designed, developed, and tested technologies should consider the latest related research findings and maintain high compliance with current industrial standards (e.g., IEC standards).