Thomas Lagkas

Thomas Lagkas
Democritus University of Thrace | DUTH · Department of Computer Science

BSc, MBA, PhD
Assistant Professor, Department of Informatics, Democritus University of Thrace, Greece

About

208
Publications
67,352
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,383
Citations
Introduction
Dr Lagkas' research interests are in the areas of IoT communications. He is IEEE Senior Member and Fellow of the Higher Education Academy in UK. He participates in the Editorial Boards of the IEEE IoT Journal, the Elsevier Computer Networks Journal, the Springer Telecommunication Systems Journal, the EURASIP Journal on Wireless Communications and Networking (by Springer), and the MDPI Telecom Journal. He actively participates in the preparation and implementation of several EU funded projects.
Additional affiliations
September 2019 - present
International Hellenic University
Position
  • Professor (Assistant)
January 2019 - present
The University of Sheffield
Position
  • Lecturer
January 2019 - September 2019
The University of Sheffield
Position
  • Lecturer
Description
  • Departmental Research Director since 2017
Education
October 2008 - December 2013
Hellenic Open University
Field of study
  • Business Administration
February 2003 - November 2006
Aristotle University of Thessaloniki
Field of study
  • Wireless Networks
October 1998 - November 2002
Aristotle University of Thessaloniki
Field of study
  • Computer Science

Publications

Publications (208)
Conference Paper
Full-text available
With the ongoing integration of machine learning models into critical infrastructure, the resilience of these systems against adversarial attacks is important for all domains. This paper introduces an adversarial attack generator framework against a network dataset that is part of OCPP Dataset using CI-CFlowMeter parser. We conduct a comprehensive...
Data
This dataset consists of 375 high-resolution visible-spectrum (RGB) and 375 thermal infrared (TIR) images of a vineyard (Vitis vinifera L.) captured by a Unmanned Aerial Vehicle (UAV) carrying TIR and RGB sensors. Also, the dataset contains 375 RGB images with pseudo-coloring where plants' stressed areas exist, aligned, and cropped based on the TIR...
Conference Paper
Full-text available
This paper presents FraMark, a blockchain-based framework for 5G network management that utilizes Hyperledger Fabric and fractional Non-Fungible Tokens (NFTs) to optimize resource allocation. We introduce a comprehensive system that fractionalizes digital assets to represent 5G network resources, enhancing efficiency and allocation flexibility. Our...
Conference Paper
Full-text available
In the rapidly evolving field of cybersecurity, Cyber Threat Intelligence (CTI) sharing has become an essential practice to enhance awareness of emerging threats and enable infrastructure owners to defend against cyber incidents more efficiently. AI4COLLAB introduces a comprehensive CTI sharing platform designed to address the various challenges as...
Article
Full-text available
Forest fires are a persistent global problem, causing devastating consequences such as loss of human lives, harm to the environment, and substantial economic losses. To mitigate these impacts, the accurate prediction and early detection of forest fires is critical. In response to this challenge and living in the digital era of Artificial Intelligen...
Article
Full-text available
The proliferation of vehicular ad hoc networks necessitates efficient data transfer protocols, particularly in the context of Cellular Vehicle-to-Everything (C-V2X) communications. This paper focuses on enhancing the performance of the Quick UDP Internet Connections (QUIC) protocol, focusing on cooperative vehicular networks supported by aerial dro...
Article
Full-text available
The Internet of Drones (IoD) is a decentralized network linking drones’ access to controlled airspace, providing high adaptability to complex scenarios and services to various drone applications, such as package delivery, traffic surveillance, and rescue, including navigation services. Unmanned Aerial Vehicles (UAVs), combined with IoD principles,...
Preprint
Full-text available
Federated learning (FL) is a decentralized learning technique that enables participating devices to collaboratively build a shared Machine Leaning (ML) or Deep Learning (DL) model without revealing their raw data to a third party. Due to its privacy-preserving nature, FL has sparked widespread attention for building Intrusion Detection Systems (IDS...
Conference Paper
Full-text available
Smart solutions in the healthcare domain have garnered considerable attention due to their potential to enhance standard treatment methods and improve overall health. However, privacy concerns often prevent the sharing of healthcare data, which can limit the scope for improvement. In this context, Federated Learning (FL) has emerged as a transforma...
Data
This dataset supports the article entitled "Integrating Thermal Infrared and RGB Imaging for Early Detection of Water Stress in Lettuces with Comparative Analysis of IoT Sensors". This dataset consists of Thermal Infrared (TIR) images with embedded visible-spectrum (RGB) images of two lettuces (Lactuca sativa var. capitata L), which were captured b...
Article
Full-text available
Remote sensing stands out as one of the most widely used operations in the field. In this research area, UAVs offer full coverage of large cultivation areas in a few minutes and provide orthomosaic images with valuable information based on multispectral cameras. Especially for orchards, it is helpful to isolate each tree and then calculate the pref...
Article
Full-text available
Taking into consideration the existing Industry 4.0 infrastructures and the rise of Industry 5.0 (I5.0), more and more solutions are being developed, aiming towards increased environmental consciousness through advanced technologies, and human centricity. However, there are ongoing requirements on data traceability, and access to the related actors...
Article
Full-text available
Federated Learning has emerged as a revolutionary technology in Machine Learning (ML), enabling collaborative training of models in a distributed environment while ensuring privacy and security. This work discusses the topic of FL by providing insights into its various dimensions, perspectives, and components, leading to a comprehensive understandi...
Article
Full-text available
Towards the advent of the sixth generation (6G) wireless networks, smart technologies play a key role in the end-to-end automation of services across multiple domains. In particular, they create a new reality with multiple benefits, including intent-driven management, ultra-speed communication services and holistic integration within the Internet o...
Conference Paper
Full-text available
The evolution of fifth-generation (5G) networks represents a significant technological leap towards a seamless and advanced user experience, allowing hyperconnected use cases with faster data transfer, lower latency and better connectivity for a wide range of mobile devices. In particular, a key element of 5G is the 5G Core (5GC) which follows a se...
Conference Paper
Full-text available
The progression of fifth-generation (5G) networks provides multiple advantages, such as faster speed, reduced latency and increased capacity. Towards these advancements, it is clear that 5G Core (5GC) represents the heart of a 5G network, providing a variety of new network services such as Ultra-reliable low-latency communication (URLLC) and Massiv...
Chapter
Full-text available
Federated learning (FL) is a novel methodology aiming at training machine learning (ML) and deep learning (DL) models in a decentralized manner in order to solve three main problems seen in the artificial intelligence (AI) sector, namely, (a) model optimization, (b) data security and privacy, and (c) resource optimization. FL has been established a...
Chapter
Full-text available
The centralization of data is a current practice in information systems that do not fit into the novel next-generation computing concept. Such a paradigm aims to support the distribution of information, processing, and computing power. Blockchain is a technology supporting the recording of information for distributed and decentralized, peer-to-peer...
Chapter
Full-text available
The rapid growth of the Internet of Things has shaped the design and deployment of mobile networks to accommodate the need for ubiquitous connectivity and novel applications. The recent advancements in wireless communications and computing technologies allow the connection of a wider range and number of devices and systems, thereby enabling the des...
Conference Paper
Full-text available
The popularity of 5G networks has resulted in significant advancement and opportunities in connectivity and reliability of communications, but, concurrently, it raised security challenges and privacy concerns due to the distributed and highly dynamic nature of these networks. In particular, while participating devices and nodes in a 5G network need...
Article
Full-text available
The abiotic and biotic plant stress is a critical factor for the agriculture industry, considering that plant stress increases production costs and reduces the quantity and quality of the output product. The early detection of plant stress using new technologies and even more utilizing Internet of Things (IoT) sensors is significant for the growers...
Conference Paper
Full-text available
Embedded AI development has been rapidly improving for the past few years and has had a great impact on edge AI networks. However, as neural networks become deeper and deeper it becomes more difficult to execute complicated tasks without sacrificing a good amount of power and performance. In this paper, we make a comparative evaluation between two...
Article
Full-text available
The Tactile Internet (TI) is a recently emerging field that has been developing and evolving to date, since its communications parallel the sense of human touch. Lately, the revolutionized concept, Metaverse, draws attention due to the evolved immersive experience of human perception of the surrounding environment. This technology supports the ulti...
Article
Full-text available
With the increasing number of users accessing the Internet over 5G systems, security concerns have become a major challenge that needs to be addressed. This paper proposes a solution to this challenge by proposing a system to train defenders to handle cyber attacks and develop intrusion detection systems that can timely notify of security events, a...
Conference Paper
Full-text available
The electrical grid has significantly evolved over the years, thus creating a smart paradigm, which is well known as the smart electrical grid. However, this evolution creates critical cybersecurity risks due to the vulnerable nature of the industrial systems and the involvement of new technologies. Therefore, in this paper, the ELECTRON architectu...
Conference Paper
Full-text available
The rapid progression of the Internet of Things allows the seamless integration of cyber and physical environments, thus creating an overall hyper-connected ecosystem. It is evident that this new reality provides several capabilities and benefits, such as real-time decision-making and increased efficiency and productivity. However, it also raises c...
Article
Full-text available
Task allocation in edge computing refers to the process of distributing tasks among the various nodes in an edge computing network. The main challenges in task allocation include determining the optimal location for each task based on the requirements such as processing power, storage, and network bandwidth, and adapting to the dynamic nature of th...
Conference Paper
Current vision-based detection models within Autonomous Vehicles, can be susceptible to changes within the physical environment, which cause unexpected issues. Physical attacks on traffic signs could be malicious or naturally occurring, causing incorrect identification of the traffic sign which can drastically alter the behaviour of the autonomous...
Article
Full-text available
Given the observed developments of novel communication modes and the establishment of next‐generation cellular networks, mobility modelling and ad hoc routing requirements have emerged. Flying ad hoc networks (FANETs) are key pivots in enabling technological leaps in the domain of on‐demand communications, especially in emergency scenarios; as such...
Preprint
Full-text available
High-end components that conduct complicated tasks automatically are a part of modern industrial systems. However, in order for these parts to function at the desired level, they need to be maintained by qualified experts. Solutions based on Augmented Reality (AR) have been established with the goal of raising production rates and quality while low...
Preprint
Full-text available
Augmented Reality (AR) solutions are providing tools that could improve applications in the medical and industrial fields. Augmentation can provide additional information in training, visualization, and work scenarios, to increase efficiency, reliability, and safety, while improving communication with other devices and systems on the network. Unfor...
Preprint
Full-text available
The objective of augmented reality (AR) is to add digital content to natural images and videos to create an interactive experience between the user and the environment. Scene analysis and object recognition play a crucial role in AR, as they must be performed quickly and accurately. In this study, a new approach is proposed that involves using orie...
Conference Paper
Full-text available
The rapid evolution of the 5G environments introduces several benefits, such as faster data transfer speeds, lower latency and energy efficiency. However, this situation brings also critical cybersecurity issues, such as the complex and increased attack surface, privacy concerns and the security of the 5G core network functions. Therefore, it is ev...
Conference Paper
Full-text available
Due to constant technological advancements, Smart Grids have the potential to significantly reduce energy consumption, while providing efficient energy management. However, their implementation requires a thorough collection of data related to procedures of energy generation and distribution, as well as the inclusion of Circular Economy (CE) princi...
Conference Paper
Full-text available
The digitisation of the smart electrical grid provides several advantages and valuable services, such as self-monitoring, pervasive control and smart healing. However, despite the benefits of this progression, critical cybersecurity and privacy issues are raised due to the vulnerabilities of legacy Electrical Power and Energy Systems (EPES) and the...
Data
This dataset consists of high-resolution visible-spectrum (RGB) and thermal infrared (TIR) images of two vineyards (Vitis vinifera L.) with varieties of Mouhtaro and Merlot, which was captured by Unmanned Aerial Vehicle (UAV) carrying TIR and RGB sensors three times in a cultivation period. The RGB and TIR images are used initially for the vineyard...
Article
Modern Healthcare cyberphysical systems have begun to rely more and more on distributed AI leveraging the power of Federated Learning (FL). Its ability to train Machine Learning (ML) and Deep Learning (DL) models for the wide variety of medical fields, while at the same time fortifying the privacy of the sensitive information that are present in th...
Article
Full-text available
The development of computer hardware and communications has brought with it many exciting applications in the Internet of Things. More and more Single Board Computers (SBC) with high performance and low power consumption are used to infer deep learning models at the edge of the network. In this article, we investigate a cooperative task execution s...
Preprint
Full-text available
Taking into consideration the rise of Industry 5.0 (I5.0), more and more solutions are being developed, aiming towards increased environmental consciousness through advanced technologies, and human centricity. Digital Product Passports (DPPs) constitute a novel technological solution that can enable the transition toward a digital Circular Economy...
Conference Paper
The advent of the Internet of Things has allowed the re-usability of established techniques combined with emerging technologies. In the TERMINET project, several key-enabling technologies in an IoT ecosystem are explored. The smart farming paradigm is one of the realistic use cases of the project, in which Wireless Power Transfer, assisted by an Un...
Preprint
Full-text available
p>Taking into consideration the rise of Industry 5.0 (I5.0), more and more solutions are being developed, aiming towards increased environmental consciousness through advanced technologies, and human centricity. Digital Product Passports (DPPs) constitute a novel technological solution that can enable the transition toward a digital Circular Econom...
Article
Full-text available
The modern communications landscape requires reliable, high-speed, high-throughput and secure links and sessions between user equipment instances and the data network. The 5G core implements the newly defined 3GPP network architecture enabling faster connectivity, low latency, higher bit rates and network reliability. The full potential of this set...
Conference Paper
Full-text available
The transformation of the conventional electrical grid into a digital ecosystem brings significant benefits, such as two-way communication between energy consumers and utilities, self-monitoring and pervasive controls. However, the advent of the smart electrical grid raises severe cybersecurity and privacy concerns, given the presence of legacy sys...
Conference Paper
Full-text available
As the networking and communications landscape moves towards 5G and an increasing number of users are already accessing the Internet over 5G systems at an increasing pace, security issues rise and the corresponding vulnerabilities are in need of being addressed. The work presented in this paper constitutes an attempt at addressing the issue of trai...
Article
Full-text available
The Transmission Control Protocol (TCP) is a reliable, connection oriented, congestion control mechanism, currently utilized the majority of both wired and wireless networks at the transport layer. An important function of TCP is the network congestion control mechanism; it governs the packet transmission rate and us enables the protocol to respond...
Raw Data
In the digital era of the Industrial Internet of Things (IIoT), the conventional Critical Infrastructures (CIs) are transformed into smart environments with multiple benefits, such as pervasive control, self-monitoring and self-healing. However, this evolution is characterised by several cyberthreats due to the necessary presence of insecure techno...
Article
Full-text available
The research interest in Digital Circular Economy models is constantly growing, especially by studying the impact and implications of circular principles and Internet of Things technologies in modern society. Up until now, Industry 4.0 has been recognized as a vital enabler of circular approaches, building the first step towards sustainable Industr...
Article
Full-text available
Information security attacks targeting human nature, such as phishing, are rising rapidly. Information security Awareness (ISA) programs have been proven to be valuable proactive measures that increase Return On Investment (ROI) regarding information security enhancement. These programs tend to focus on concepts and technical aspects. Although thes...
Conference Paper
Full-text available
With the advent of vehicular networks and the corresponding requirements, developers are faced with new challenges associated with fundamental protocol attributes and capabilities. In our work, we consider ESP-NOW: a connectionless WiFi communication protocol developed by Espressif and featuring short packet (up to 250 bytes) transmission. It is di...
Raw Data
The evolution of the Industrial Internet of Things (IIoT) introduces several benefits, such as real-time monitoring, pervasive control and self-healing. However, despite the valuable services, security and privacy issues still remain given the presence of legacy and insecure communication protocols like IEC 60870-5-104. IEC 60870-5-104 is an indust...
Article
Full-text available
Next generation wireless networks are expected to be greatly supported by unmanned aerial vehicles, which can act as aerial base stations and constitute a promising solution for the exorbitant rise in user demands. This is possible because of unmanned aerial vehicle characteristics such as mobility, flexibility, increased line-of-sight probability,...
Article
Full-text available
Software Defined Networking (SDN) marked the beginning of a new era in the field of networking by decoupling the control and forwarding processes through the OpenFlow protocol. The Next Generation SDN is defined by Open Interfaces and full programmability of the data plane. P4 is a domain specific language that fulfills these requirements and has k...
Conference Paper
Full-text available
The rapid growth of computer networks in various sectors has led to new services previously hard or impossible to implement. Internet of Things has also assisted in this evolution offering easy access to data but at the same time imposing constraints on both security and quality of service. In this paper, an SDN fault tolerant and resilient SDN con...