
Thomas LagkasInternational Hellenic University · Department of Computer Science
Thomas Lagkas
BSc, MBA, PhD
Assistant Professor, Department of Computer Science, International Hellenic University, Greece
About
148
Publications
43,116
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,680
Citations
Citations since 2017
Introduction
Dr Lagkas' research interests are in the areas of IoT communications. He is IEEE Senior Member and Fellow of the Higher Education Academy in UK. He participates in the Editorial Boards of the IEEE IoT Journal, the Elsevier Computer Networks Journal, the Springer Telecommunication Systems Journal, the EURASIP Journal on Wireless Communications and Networking (by Springer), and the MDPI Telecom Journal. He actively participates in the preparation and implementation of several EU funded projects.
Additional affiliations
September 2019 - present
September 2019 - present
International Hellenic University
Position
- Professor (Assistant)
January 2019 - September 2019
Education
October 2008 - December 2013
February 2003 - November 2006
October 1998 - November 2002
Publications
Publications (148)
The modern communications landscape requires reliable, high-speed, high-throughput and secure links and sessions between user equipment instances and the data network. The 5G core implements the newly defined 3GPP network architecture enabling faster connectivity, low latency, higher bit rates and network reliability. The full potential of this set...
The transformation of the conventional electrical grid into a digital ecosystem brings significant benefits, such as two-way communication between energy consumers and utilities, self-monitoring and pervasive controls. However, the advent of the smart electrical grid raises severe cybersecurity and privacy concerns, given the presence of legacy sys...
As the networking and communications landscape moves towards 5G and an increasing number of users are already accessing the Internet over 5G systems at an increasing pace, security issues rise and the corresponding vulnerabilities are in need of being addressed. The work presented in this paper constitutes an attempt at addressing the issue of trai...
The Transmission Control Protocol (TCP) is a reliable, connection oriented, congestion control mechanism, currently utilized the majority of both wired and wireless networks at the transport layer. An important function of TCP is the network congestion control mechanism; it governs the packet transmission rate and us enables the protocol to respond...
In the digital era of the Industrial Internet of Things (IIoT), the conventional Critical Infrastructures (CIs) are transformed into smart environments with multiple benefits, such as pervasive control, self-monitoring and self-healing. However, this evolution is characterised by several cyberthreats due to the necessary presence of insecure techno...
The research interest in Digital Circular Economy models is constantly growing, especially by studying the impact and implications of circular principles and Internet of Things technologies in modern society. Up until now, Industry 4.0 has been recognized as a vital enabler of circular approaches, building the first step towards sustainable Industr...
Information security attacks targeting human nature, such as phishing, are rising rapidly. Information security Awareness (ISA) programs have been proven to be valuable proactive measures that increase Return On Investment (ROI) regarding information security enhancement. These programs tend to focus on concepts and technical aspects. Although thes...
With the advent of vehicular networks and the corresponding requirements, developers are faced with new challenges associated with fundamental protocol attributes and capabilities. In our work, we consider ESP-NOW: a connectionless WiFi communication protocol developed by Espressif and featuring short packet (up to 250 bytes) transmission. It is di...
The evolution of the Industrial Internet of Things (IIoT) introduces several benefits, such as real-time monitoring, pervasive control and self-healing. However, despite the valuable services, security and privacy issues still remain given the presence of legacy and insecure communication protocols like IEC 60870-5-104. IEC 60870-5-104 is an indust...
Next generation wireless networks are expected to be greatly supported by unmanned aerial vehicles, which can act as aerial base stations and constitute a promising solution for the exorbitant rise in user demands. This is possible because of unmanned aerial vehicle characteristics such as mobility, flexibility, increased line-of-sight probability,...
Software Defined Networking (SDN) marked the beginning of a new era in the field of networking by decoupling the control and forwarding processes through the OpenFlow protocol. The Next Generation SDN is defined by Open Interfaces and full programmability of the data plane. P4 is a domain specific language that fulfills these requirements and has k...
The rapid growth of computer networks in various sectors has led to new services previously hard or impossible to implement. Internet of Things has also assisted in this evolution offering easy access to data but at the same time imposing constraints on both security and quality of service. In this paper, an SDN fault tolerant and resilient SDN con...
The integration of intelligent devices in the industry allows the automation and control of industrial processes, in an efficient and effective manner. Such systems have contributed to the rapid evolution of production infrastructures, increasing the reliability, reducing production costs, and automating the entire manufacturing operations. However...
Both signature-based and anomaly-based Intrusion Detection and Prevention System (IDPS) have already demonstrated their efficiency towards recognising and mitigating various intrusions. However, the first category cannot detect zero-day attacks, while the second one lacks the presence of appropriate datasets. Therefore, the presence of additional c...
The Internet of Vehicles (IoV) is an emerging paradigm, which is expected to be an integral component of beyond-fifth-generation and sixth-generation mobile networks. However, the processing requirements and strict delay constraints of IoV applications pose a challenge to vehicle processing units. To this end, multi-access edge computing (MEC) can...
The digitisation of the typical electrical grid introduces valuable services, such as pervasive control, remote monitoring and self-healing. However, despite the benefits, cybersecurity and privacy issues can result in devastating effects or even fatal accidents, given the interdependence between the energy sector and other critical infrastructures...
The progression of Software Defined Networking (SDN) and the virtualisation technologies lead to the beyond 5G era, providing multiple benefits in the smart economies. However, despite the advantages, security issues still remain. In particular, SDN/NFV and cloud/edge computing are related to various security issues. Moreover, due to the wireless n...
The modern communications landscape requires reliable, high-speed, high- throughput and secure links and sessions between user equipment instances and the data network. The 5G core implements the newly defined 3GPP network ar- chitecture enabling faster connectivity, low latency, higher bit rates and network reliability. The full potential of this...
Digital Circular Economy and Industry 5.0 have been two significant research attractions in the last years, due to the evolution of their predecessors into advanced technologies. Circular Economy (CE) has progressed into a sustainable digital approach, capable to be implemented into different scenarios. Industry 5.0 has turned from a fully automate...
The highly beneficial contribution of intelligent systems in the industrial domain is undeniable. Automation, supervision, remote control, and fault reduction are some of the various advantages new technologies offer. A protocol demonstrating high utility in industrial settings, and specifically, in smart grids, is Distributed Network Protocol 3 (D...
The coverage path planning (CPP) algorithms aim to cover the total area of interest with minimum overlapping. The goal of the CPP algorithms is to minimize the total covering path and execution time. Significant research has been done in robotics, particularly for multi-unmanned unmanned aerial vehicles (UAVs) cooperation and energy efficiency in C...
Advances in the fields of networking, broadband communications and demand for high-fidelity low-latency last-mile communications have rendered as-efficient-as-possible relaying methods more necessary than ever. This paper investigates the possibility of the utilization of cellular-enabled drones as aerial base stations in next-generation cellular n...
The Internet of Things (IoT) is the new paradigm of our times, where smart devices and sensors from across the globe are interconnected in a global grid, and distributed applications and services impact every area of human activity. With its huge economic impact and its pervasive influence over our lives, IoT is an attractive target for criminals,...
The emergence of next-generation internet-of-things (NG-IoT) applications introduces several challenges for the sixth-generation (6G) mobile networks, such as massive connectivity, increased network capacity, and extremely low-latency. To countermeasure the aforementioned challenges, ultra-dense networking has been widely identified as a possible s...
The technological leaps of artificial intelligence (AI) and the rise of machine learning have triggered significant progress in a plethora of natural language processing (NLP) and natural language understanding tasks. One of these tasks is argumentation mining which has received significant interest in recent years and is regarded as a key domain f...
In the era of digital economies, the smart electrical grid has provided numerous benefits, such as two-way communication, pervasive control and self-healing. However, this evolution raises severe cybersecurity and privacy risks that can lead to disastrous effects. False data injection attacks, large-scale denial of service and unauthorised access r...
Internet of Things (IoT) is a concept adopted in nearly every aspect of human life, leading to an explosive utilization of intelligent devices. Notably, such solutions are especially integrated in the industrial sector, to allow the remote monitoring and control of critical infrastructure. Such global integration of IoT solutions has led to an expa...
The technological leap of smart technologies and the Internet of Things has advanced the conventional model of the electrical power and energy systems into a new digital era, widely known as the Smart Grid. The advent of Smart Grids provides multiple benefits, such as self-monitoring, self-healing and pervasive control. However, it also raises cruc...
With the introduction of UAVs to networking, ad hoc communications have evolved past confinement to the terrestrial grid and have moved towards aerial meshes. Until now, Flying Ad-hoc Networks (FANETs) have been relying on strictly layered communication protocols for their function and routing, a tradition set by conventional networks. With layers...
Broadband mobile networks have rapidly evolved over the last years. The unique environment they operate, however, sets new challenges for the Transmission Control Protocol (TCP). In this paper, we study the impact of Long Term Evolution (LTE) handover on TCP performance with different TCP congestion control algorithms and in a wide range of network...
A considerable percentage of Internet of Things end-devices are characterised by mobility, a feature that adds extra complexity to protocols used in Wireless Sensor Networks. LoRa is one of the newly introduced wireless sensor protocols, capable of delivering messages in long distances and consuming low energy, features that make it proper for low...
This Special Issue will cover a wide range of IIoT cybersecurity and privacy solutions, combining a plethora of emerging technologies.
Please find more information at the following link:
https://www.mdpi.com/journal/electronics/special_issues/Cybersecurity_Next_Generation
The rise of the Industrial Internet of Things (IIoT) plays a crucial role in the era of hyper-connected digital economies. Despite the valuable benefits, such as increased resiliency, self-monitoring and pervasive control, IIoT raises severe cybersecurity and privacy risks, allowing cyberattackers to exploit a plethora of vulnerabilities and weakne...
In 5G and beyond telecommunication infrastructures a crucial challenge in achieving the strict Key Performance Indicators (KPIs) regarding capacity, latency, and guaranteed quality of service, is the efficient handling of the fronthaul bottleneck. This part of the next generation networks is expected to comprise the New Radio (NR) access and the Ne...
The objective of this Special Issue is to bring together the state-of-the-art research contributions that address challenges in contemporary networks design, dimensioning and optimization towards the 6G networks.
Developments in the field of neural networks, deep learning, and increases in computing systems’ capacity have allowed for a significant performance boost in scene semantic information extraction algorithms and their respective mechanisms. The work presented in this paper investigates the performance of various object classification- recognition fr...
Ultra-low latency connections for a massive number of devices are one of the main requirements of the next-generation tactile Internet-of-Things (TIoT). Grant-free non-orthogonal multiple access (GF-NOMA) is a novel paradigm that leverages the advantages of grant-free access and non-orthogonal transmissions, to deliver ultra-low latency connectivit...
The rise of the Internet of Medical Things (IoMT) introduces the healthcare ecosystem in a new digital era withmultiple benefits, such as remote medical assistance, real-time monitoring and pervasive control. However, despite the valuable healthcare services, this progression raises significant cybersecurity and privacy concerns. In this paper, we...
Unmanned aerial vehicles (UAVs) in the role of flying anchor nodes have been proposed to assist the localisation of terrestrial Internet of Things (IoT) sensors and provide relay services in the context of the upcoming 6G networks. This paper considered the objective of tracing a mobile IoT device of unknown location, using a group of UAVs that wer...
Intentional islanding is a corrective procedure that aims to protect the stability of the power system during an emergency, by dividing the grid into several partitions and isolating the elements that would cause cascading failures. This paper proposes a deep learning method to solve the problem of intentional islanding in an end-to-end manner. Two...
In recent years and with the advancement of IoT networks, malicious intrusions aiming at disrupting the services and getting access to confidential information in medical environments is ever progressing. To that end, this paper proposes a Federated Layered Architecture to be used in Medical CyberPhysical Systems (MCPS) Networks that entails the cr...
The rapid evolution of the Internet of Medical Things (IoMT) introduces the healthcare ecosystem into a new reality consisting of smart medical devices and applications that
provide multiple benefits, such as remote medical assistance, timely administration of medication, real-time monitoring, preventive care and health education. However, despite...
Internet of Things (IoT) technology such as intelligent devices, sensors, actuators and wearables have been integrated in the healthcare industry, thus contributing in the creation of smart hospitals and remote assistance environments. Ensuring the eHealth network adopts the appropriate security measures in order to effectively protect sensitive pa...
Climate change is emerging as a major threat to farming, food security and the livelihoods
of millions of people across the world. Agriculture is strongly affected by climate change due to increasing temperatures, water shortage, heavy rainfall and variations in the frequency and intensity of excessive climatic events such as floods and droughts. F...
The continuous monitoring of chronic diseases serves as one of the cornerstones in the efforts to improve the quality of life of patients and maintain the healthcare services provided to them. This study aims to provide an in-depth understanding of the perspectives of healthcare professionals on using sensor-based networks (SBN) used for remote and...
With the development of more advanced and efficient control algorithms and communication architectures, UAVs and networks thereof (swarms) now find applications in nearly all possible environments and scenarios. There exist numerous schemes which accommodate routing for such networks, many of which are specifically designed for distinct use-cases....
The employment of Low-Power Wide Area Networks (LPWANs) has proven quite beneficial to the advancement of the Internet of Things (IoT) paradigm. The utilization of low power but long range communication links of the LoRaWAN technology promises low energy consumption, while ensuring sufficient throughput. However, due to LoRa’s original scheduling p...
Recent advancements in sensor technology have allowed unmanned aerial vehicles (UAVs) to function as sensing devices in cooperative aerial communication networks, offering novel solutions in applications of environment inspection, disaster detection and search and rescue operations. Towards this trend, the efficient deployment and coordination of U...
The Electric Smart Grid (ESG) is referred to as the next generation electricity power network. The ESG is an intelligent critical infrastructure subject to various security vulnerabilities and especially data privacy breaches. This study presents a comprehensive overview of the latest privacy-preserving mechanisms and policies in the ESG, while pro...
The increased maturity level of technological achievements towards the realization of the Internet of Things (IoT) vision allowed sophisticated solutions to emerge, offering reliable monitoring in highly dynamic environments that lack well-defined and well-designed infrastructures. In this paper, we use a bio-inspired IoT architecture, which allows...
Industrial Internet of Things (IIoT) is a relatively new area of research that utilises multidisciplinary and holistic approaches to develop smart solutions for complex problems in industrial environments. Designing applications for the IIoT is a non trivial issue and requires to address, among many others, technology concerns, the protection of pe...
Supervisory Control and Data Acquisition (SCADA) systems are the underlying monitoring and control components of critical infrastructures, such as power, telecommunication, transportation, pipelines, chemicals and manufacturing plants. Legacy SCADA systems operated on isolated networks, that made them less exposed to Internet threats. However, the...
The blueSPACE project focuses on the study of innovative technologies to overcome the limitations of current fronthaul networks. The key technology proposed is space-division multiplexing, which makes it possible to increase the capacity available in conventional single-mode fibers, effectively encompassing this capacity to the forecasted bandwidth...
Simulation of the Hot-Cold tracking algorithm in Processing
The offering of demanding telecommunication services as promised by the 5G specifications raise the necessity for high capacity, flexible, adaptive, and power conserving fronthaul. Toward this goal, the role of the passive optical network which is responsible for interconnecting the central office (CO) with the cell-sites is crucial. Among the late...
Agriculture is by its nature a complicated scientific field, related to a wide range of expertise, skills, methods and processes which can be effectively supported by computerized systems. There have been many efforts towards the establishment of an automated agriculture framework, capable to control both the incoming data and the corresponding pro...