Thomas Lagkas

Thomas Lagkas
International Hellenic University · Department of Computer Science

BSc, MBA, PhD
Assistant Professor, Department of Computer Science, International Hellenic University, Greece

About

148
Publications
43,116
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,680
Citations
Citations since 2017
95 Research Items
1553 Citations
20172018201920202021202220230100200300400500600
20172018201920202021202220230100200300400500600
20172018201920202021202220230100200300400500600
20172018201920202021202220230100200300400500600
Introduction
Dr Lagkas' research interests are in the areas of IoT communications. He is IEEE Senior Member and Fellow of the Higher Education Academy in UK. He participates in the Editorial Boards of the IEEE IoT Journal, the Elsevier Computer Networks Journal, the Springer Telecommunication Systems Journal, the EURASIP Journal on Wireless Communications and Networking (by Springer), and the MDPI Telecom Journal. He actively participates in the preparation and implementation of several EU funded projects.
Additional affiliations
September 2019 - present
International Hellenic University
Position
  • Professor (Assistant)
September 2019 - present
International Hellenic University
Position
  • Professor (Assistant)
January 2019 - September 2019
The University of Sheffield
Position
  • Lecturer
Description
  • Departmental Research Director since 2017
Education
October 2008 - December 2013
Hellenic Open University
Field of study
  • Business Administration
February 2003 - November 2006
Aristotle University of Thessaloniki
Field of study
  • Wireless Networks
October 1998 - November 2002
Aristotle University of Thessaloniki
Field of study
  • Computer Science

Publications

Publications (148)
Article
Full-text available
The modern communications landscape requires reliable, high-speed, high-throughput and secure links and sessions between user equipment instances and the data network. The 5G core implements the newly defined 3GPP network architecture enabling faster connectivity, low latency, higher bit rates and network reliability. The full potential of this set...
Conference Paper
Full-text available
The transformation of the conventional electrical grid into a digital ecosystem brings significant benefits, such as two-way communication between energy consumers and utilities, self-monitoring and pervasive controls. However, the advent of the smart electrical grid raises severe cybersecurity and privacy concerns, given the presence of legacy sys...
Conference Paper
Full-text available
As the networking and communications landscape moves towards 5G and an increasing number of users are already accessing the Internet over 5G systems at an increasing pace, security issues rise and the corresponding vulnerabilities are in need of being addressed. The work presented in this paper constitutes an attempt at addressing the issue of trai...
Article
Full-text available
The Transmission Control Protocol (TCP) is a reliable, connection oriented, congestion control mechanism, currently utilized the majority of both wired and wireless networks at the transport layer. An important function of TCP is the network congestion control mechanism; it governs the packet transmission rate and us enables the protocol to respond...
Raw Data
In the digital era of the Industrial Internet of Things (IIoT), the conventional Critical Infrastructures (CIs) are transformed into smart environments with multiple benefits, such as pervasive control, self-monitoring and self-healing. However, this evolution is characterised by several cyberthreats due to the necessary presence of insecure techno...
Article
Full-text available
The research interest in Digital Circular Economy models is constantly growing, especially by studying the impact and implications of circular principles and Internet of Things technologies in modern society. Up until now, Industry 4.0 has been recognized as a vital enabler of circular approaches, building the first step towards sustainable Industr...
Article
Full-text available
Information security attacks targeting human nature, such as phishing, are rising rapidly. Information security Awareness (ISA) programs have been proven to be valuable proactive measures that increase Return On Investment (ROI) regarding information security enhancement. These programs tend to focus on concepts and technical aspects. Although thes...
Conference Paper
Full-text available
With the advent of vehicular networks and the corresponding requirements, developers are faced with new challenges associated with fundamental protocol attributes and capabilities. In our work, we consider ESP-NOW: a connectionless WiFi communication protocol developed by Espressif and featuring short packet (up to 250 bytes) transmission. It is di...
Raw Data
The evolution of the Industrial Internet of Things (IIoT) introduces several benefits, such as real-time monitoring, pervasive control and self-healing. However, despite the valuable services, security and privacy issues still remain given the presence of legacy and insecure communication protocols like IEC 60870-5-104. IEC 60870-5-104 is an indust...
Article
Full-text available
Next generation wireless networks are expected to be greatly supported by unmanned aerial vehicles, which can act as aerial base stations and constitute a promising solution for the exorbitant rise in user demands. This is possible because of unmanned aerial vehicle characteristics such as mobility, flexibility, increased line-of-sight probability,...
Article
Software Defined Networking (SDN) marked the beginning of a new era in the field of networking by decoupling the control and forwarding processes through the OpenFlow protocol. The Next Generation SDN is defined by Open Interfaces and full programmability of the data plane. P4 is a domain specific language that fulfills these requirements and has k...
Conference Paper
Full-text available
The rapid growth of computer networks in various sectors has led to new services previously hard or impossible to implement. Internet of Things has also assisted in this evolution offering easy access to data but at the same time imposing constraints on both security and quality of service. In this paper, an SDN fault tolerant and resilient SDN con...
Conference Paper
Full-text available
The integration of intelligent devices in the industry allows the automation and control of industrial processes, in an efficient and effective manner. Such systems have contributed to the rapid evolution of production infrastructures, increasing the reliability, reducing production costs, and automating the entire manufacturing operations. However...
Conference Paper
Full-text available
Both signature-based and anomaly-based Intrusion Detection and Prevention System (IDPS) have already demonstrated their efficiency towards recognising and mitigating various intrusions. However, the first category cannot detect zero-day attacks, while the second one lacks the presence of appropriate datasets. Therefore, the presence of additional c...
Article
Full-text available
The Internet of Vehicles (IoV) is an emerging paradigm, which is expected to be an integral component of beyond-fifth-generation and sixth-generation mobile networks. However, the processing requirements and strict delay constraints of IoV applications pose a challenge to vehicle processing units. To this end, multi-access edge computing (MEC) can...
Conference Paper
Full-text available
The digitisation of the typical electrical grid introduces valuable services, such as pervasive control, remote monitoring and self-healing. However, despite the benefits, cybersecurity and privacy issues can result in devastating effects or even fatal accidents, given the interdependence between the energy sector and other critical infrastructures...
Article
Full-text available
The progression of Software Defined Networking (SDN) and the virtualisation technologies lead to the beyond 5G era, providing multiple benefits in the smart economies. However, despite the advantages, security issues still remain. In particular, SDN/NFV and cloud/edge computing are related to various security issues. Moreover, due to the wireless n...
Preprint
The modern communications landscape requires reliable, high-speed, high- throughput and secure links and sessions between user equipment instances and the data network. The 5G core implements the newly defined 3GPP network ar- chitecture enabling faster connectivity, low latency, higher bit rates and network reliability. The full potential of this...
Conference Paper
Full-text available
Digital Circular Economy and Industry 5.0 have been two significant research attractions in the last years, due to the evolution of their predecessors into advanced technologies. Circular Economy (CE) has progressed into a sustainable digital approach, capable to be implemented into different scenarios. Industry 5.0 has turned from a fully automate...
Conference Paper
Full-text available
The highly beneficial contribution of intelligent systems in the industrial domain is undeniable. Automation, supervision, remote control, and fault reduction are some of the various advantages new technologies offer. A protocol demonstrating high utility in industrial settings, and specifically, in smart grids, is Distributed Network Protocol 3 (D...
Article
Full-text available
The coverage path planning (CPP) algorithms aim to cover the total area of interest with minimum overlapping. The goal of the CPP algorithms is to minimize the total covering path and execution time. Significant research has been done in robotics, particularly for multi-unmanned unmanned aerial vehicles (UAVs) cooperation and energy efficiency in C...
Article
Full-text available
Advances in the fields of networking, broadband communications and demand for high-fidelity low-latency last-mile communications have rendered as-efficient-as-possible relaying methods more necessary than ever. This paper investigates the possibility of the utilization of cellular-enabled drones as aerial base stations in next-generation cellular n...
Article
Full-text available
The Internet of Things (IoT) is the new paradigm of our times, where smart devices and sensors from across the globe are interconnected in a global grid, and distributed applications and services impact every area of human activity. With its huge economic impact and its pervasive influence over our lives, IoT is an attractive target for criminals,...
Article
Full-text available
The emergence of next-generation internet-of-things (NG-IoT) applications introduces several challenges for the sixth-generation (6G) mobile networks, such as massive connectivity, increased network capacity, and extremely low-latency. To countermeasure the aforementioned challenges, ultra-dense networking has been widely identified as a possible s...
Article
Full-text available
The technological leaps of artificial intelligence (AI) and the rise of machine learning have triggered significant progress in a plethora of natural language processing (NLP) and natural language understanding tasks. One of these tasks is argumentation mining which has received significant interest in recent years and is regarded as a key domain f...
Article
Full-text available
In the era of digital economies, the smart electrical grid has provided numerous benefits, such as two-way communication, pervasive control and self-healing. However, this evolution raises severe cybersecurity and privacy risks that can lead to disastrous effects. False data injection attacks, large-scale denial of service and unauthorised access r...
Article
Full-text available
Internet of Things (IoT) is a concept adopted in nearly every aspect of human life, leading to an explosive utilization of intelligent devices. Notably, such solutions are especially integrated in the industrial sector, to allow the remote monitoring and control of critical infrastructure. Such global integration of IoT solutions has led to an expa...
Article
Full-text available
The technological leap of smart technologies and the Internet of Things has advanced the conventional model of the electrical power and energy systems into a new digital era, widely known as the Smart Grid. The advent of Smart Grids provides multiple benefits, such as self-monitoring, self-healing and pervasive control. However, it also raises cruc...
Article
Full-text available
With the introduction of UAVs to networking, ad hoc communications have evolved past confinement to the terrestrial grid and have moved towards aerial meshes. Until now, Flying Ad-hoc Networks (FANETs) have been relying on strictly layered communication protocols for their function and routing, a tradition set by conventional networks. With layers...
Article
Full-text available
Broadband mobile networks have rapidly evolved over the last years. The unique environment they operate, however, sets new challenges for the Transmission Control Protocol (TCP). In this paper, we study the impact of Long Term Evolution (LTE) handover on TCP performance with different TCP congestion control algorithms and in a wide range of network...
Article
Full-text available
A considerable percentage of Internet of Things end-devices are characterised by mobility, a feature that adds extra complexity to protocols used in Wireless Sensor Networks. LoRa is one of the newly introduced wireless sensor protocols, capable of delivering messages in long distances and consuming low energy, features that make it proper for low...
Research
Full-text available
This Special Issue will cover a wide range of IIoT cybersecurity and privacy solutions, combining a plethora of emerging technologies. Please find more information at the following link: https://www.mdpi.com/journal/electronics/special_issues/Cybersecurity_Next_Generation
Conference Paper
Full-text available
The rise of the Industrial Internet of Things (IIoT) plays a crucial role in the era of hyper-connected digital economies. Despite the valuable benefits, such as increased resiliency, self-monitoring and pervasive control, IIoT raises severe cybersecurity and privacy risks, allowing cyberattackers to exploit a plethora of vulnerabilities and weakne...
Article
Full-text available
In 5G and beyond telecommunication infrastructures a crucial challenge in achieving the strict Key Performance Indicators (KPIs) regarding capacity, latency, and guaranteed quality of service, is the efficient handling of the fronthaul bottleneck. This part of the next generation networks is expected to comprise the New Radio (NR) access and the Ne...
Research
Full-text available
The objective of this Special Issue is to bring together the state-of-the-art research contributions that address challenges in contemporary networks design, dimensioning and optimization towards the 6G networks.
Article
Full-text available
Developments in the field of neural networks, deep learning, and increases in computing systems’ capacity have allowed for a significant performance boost in scene semantic information extraction algorithms and their respective mechanisms. The work presented in this paper investigates the performance of various object classification- recognition fr...
Conference Paper
Full-text available
Ultra-low latency connections for a massive number of devices are one of the main requirements of the next-generation tactile Internet-of-Things (TIoT). Grant-free non-orthogonal multiple access (GF-NOMA) is a novel paradigm that leverages the advantages of grant-free access and non-orthogonal transmissions, to deliver ultra-low latency connectivit...
Article
Full-text available
The rise of the Internet of Medical Things (IoMT) introduces the healthcare ecosystem in a new digital era withmultiple benefits, such as remote medical assistance, real-time monitoring and pervasive control. However, despite the valuable healthcare services, this progression raises significant cybersecurity and privacy concerns. In this paper, we...
Article
Full-text available
Unmanned aerial vehicles (UAVs) in the role of flying anchor nodes have been proposed to assist the localisation of terrestrial Internet of Things (IoT) sensors and provide relay services in the context of the upcoming 6G networks. This paper considered the objective of tracing a mobile IoT device of unknown location, using a group of UAVs that wer...
Article
Full-text available
Intentional islanding is a corrective procedure that aims to protect the stability of the power system during an emergency, by dividing the grid into several partitions and isolating the elements that would cause cascading failures. This paper proposes a deep learning method to solve the problem of intentional islanding in an end-to-end manner. Two...
Conference Paper
In recent years and with the advancement of IoT networks, malicious intrusions aiming at disrupting the services and getting access to confidential information in medical environments is ever progressing. To that end, this paper proposes a Federated Layered Architecture to be used in Medical CyberPhysical Systems (MCPS) Networks that entails the cr...
Conference Paper
Full-text available
The rapid evolution of the Internet of Medical Things (IoMT) introduces the healthcare ecosystem into a new reality consisting of smart medical devices and applications that provide multiple benefits, such as remote medical assistance, timely administration of medication, real-time monitoring, preventive care and health education. However, despite...
Conference Paper
Internet of Things (IoT) technology such as intelligent devices, sensors, actuators and wearables have been integrated in the healthcare industry, thus contributing in the creation of smart hospitals and remote assistance environments. Ensuring the eHealth network adopts the appropriate security measures in order to effectively protect sensitive pa...
Article
Full-text available
Climate change is emerging as a major threat to farming, food security and the livelihoods of millions of people across the world. Agriculture is strongly affected by climate change due to increasing temperatures, water shortage, heavy rainfall and variations in the frequency and intensity of excessive climatic events such as floods and droughts. F...
Article
Full-text available
The continuous monitoring of chronic diseases serves as one of the cornerstones in the efforts to improve the quality of life of patients and maintain the healthcare services provided to them. This study aims to provide an in-depth understanding of the perspectives of healthcare professionals on using sensor-based networks (SBN) used for remote and...
Article
Full-text available
With the development of more advanced and efficient control algorithms and communication architectures, UAVs and networks thereof (swarms) now find applications in nearly all possible environments and scenarios. There exist numerous schemes which accommodate routing for such networks, many of which are specifically designed for distinct use-cases....
Article
The employment of Low-Power Wide Area Networks (LPWANs) has proven quite beneficial to the advancement of the Internet of Things (IoT) paradigm. The utilization of low power but long range communication links of the LoRaWAN technology promises low energy consumption, while ensuring sufficient throughput. However, due to LoRa’s original scheduling p...
Article
Full-text available
Recent advancements in sensor technology have allowed unmanned aerial vehicles (UAVs) to function as sensing devices in cooperative aerial communication networks, offering novel solutions in applications of environment inspection, disaster detection and search and rescue operations. Towards this trend, the efficient deployment and coordination of U...
Article
Full-text available
The Electric Smart Grid (ESG) is referred to as the next generation electricity power network. The ESG is an intelligent critical infrastructure subject to various security vulnerabilities and especially data privacy breaches. This study presents a comprehensive overview of the latest privacy-preserving mechanisms and policies in the ESG, while pro...
Article
Full-text available
The increased maturity level of technological achievements towards the realization of the Internet of Things (IoT) vision allowed sophisticated solutions to emerge, offering reliable monitoring in highly dynamic environments that lack well-defined and well-designed infrastructures. In this paper, we use a bio-inspired IoT architecture, which allows...
Conference Paper
Industrial Internet of Things (IIoT) is a relatively new area of research that utilises multidisciplinary and holistic approaches to develop smart solutions for complex problems in industrial environments. Designing applications for the IIoT is a non trivial issue and requires to address, among many others, technology concerns, the protection of pe...
Article
Full-text available
Supervisory Control and Data Acquisition (SCADA) systems are the underlying monitoring and control components of critical infrastructures, such as power, telecommunication, transportation, pipelines, chemicals and manufacturing plants. Legacy SCADA systems operated on isolated networks, that made them less exposed to Internet threats. However, the...
Article
Full-text available
The blueSPACE project focuses on the study of innovative technologies to overcome the limitations of current fronthaul networks. The key technology proposed is space-division multiplexing, which makes it possible to increase the capacity available in conventional single-mode fibers, effectively encompassing this capacity to the forecasted bandwidth...
Code
Simulation of the Hot-Cold tracking algorithm in Processing
Article
Full-text available
The offering of demanding telecommunication services as promised by the 5G specifications raise the necessity for high capacity, flexible, adaptive, and power conserving fronthaul. Toward this goal, the role of the passive optical network which is responsible for interconnecting the central office (CO) with the cell-sites is crucial. Among the late...
Article
Full-text available
Agriculture is by its nature a complicated scientific field, related to a wide range of expertise, skills, methods and processes which can be effectively supported by computerized systems. There have been many efforts towards the establishment of an automated agriculture framework, capable to control both the incoming data and the corresponding pro...