Papers by Panagiotis Trakadas
Sensors
The provision of high data rate services to mobile users combined with improved quality of experi... more The provision of high data rate services to mobile users combined with improved quality of experience (i.e., zero latency multimedia content) drives technological evolution towards the design and implementation of fifth generation (5G) broadband wireless networks. To this end, a dynamic network design approach is adopted whereby network topology is configured according to service demands. In parallel, many private companies are interested in developing their own 5G networks, also referred to as non-public networks (NPNs), since this deployment is expected to leverage holistic production monitoring and support critical applications. In this context, this paper introduces a 5G NPN architectural approach, supporting among others various key enabling technologies, such as cell densification, disaggregated RAN with open interfaces, edge computing, and AI/ML-based network optimization. In the same framework, potential applications of our proposed approach in real world scenarios (e.g., su...
IEEE Communications Magazine
Telecom
Virtualization is commonly accepted as the catalyst that would grant the internet the ability to ... more Virtualization is commonly accepted as the catalyst that would grant the internet the ability to shed the shackles of legacy technologies and evolve to its future self. In order to make this transformation feasible, unavoidable concurrent radical remodeling of all the involved counterparts is required, particularly in the context of automatically and optimally serving application requests by taking advantage of new virtualized environments and their latent capabilities. A considerable number of embedding strategies that efficiently map virtual computational and networking demands over physical resources have already been proposed in the literature, following different strategies. Among these suggested strategies, different coordination proposals have been adopted, in order to solve the node and link mapping functions. In this paper, we study the capabilities of the most popular embedding strategies, based on their coordination categorization. Our study confirms that by invoking a co...
Sensors
The digitization of manufacturing industry has led to leaner and more efficient production, under... more The digitization of manufacturing industry has led to leaner and more efficient production, under the Industry 4.0 concept. Nowadays, datasets collected from shop floor assets and information technology (IT) systems are used in data-driven analytics efforts to support more informed business intelligence decisions. However, these results are currently only used in isolated and dispersed parts of the production process. At the same time, full integration of artificial intelligence (AI) in all parts of manufacturing systems is currently lacking. In this context, the goal of this manuscript is to present a more holistic integration of AI by promoting collaboration. To this end, collaboration is understood as a multi-dimensional conceptual term that covers all important enablers for AI adoption in manufacturing contexts and is promoted in terms of business intelligence optimization, human-in-the-loop and secure federation across manufacturing sites. To address these challenges, the propo...
2021 IEEE 22nd International Conference on High Performance Switching and Routing (HPSR)
Sensors
The specific demands of supply chains built upon large and complex IoT systems, make it a must to... more The specific demands of supply chains built upon large and complex IoT systems, make it a must to design a coordinated framework for cyber resilience provisioning, intended to guarantee trusted supply chains of ICT systems, built upon distributed, dynamic, potentially insecure, and heterogeneous ICT infrastructures. As such, the solution proposed in this paper is envisioned to deal with the whole supply chain system components, from the IoT ecosystem to the infrastructure connecting them, addressing security and privacy functionalities related to risks and vulnerabilities management, accountability, and mitigation strategies, as well as security metrics and evidence-based security assurance. In this paper, we present FISHY as a preliminary architecture that is designed to orchestrate existing and beyond state-of-the-art security appliances in composed ICT scenarios. To this end, the FISHY architecture leverages the capabilities of programmable networks and IT infrastructure through ...
2019 European Conference on Networks and Communications (EuCNC), Jun 1, 2019
The lack of interoperability among IoT platforms has led to a fragmented environment, where the u... more The lack of interoperability among IoT platforms has led to a fragmented environment, where the users and society as a whole suffer from lock-ins, lack of privacy, and reduced functionality. This paper presents SOFIE, a solution for federating the existing IoT platforms in an open and secure manner using Distributed Ledger Technologies (DLTs) and without requiring modifications to the IoT platforms, and describes how SOFIE is used to enable two complex real life pilots: food supply chain tracking from field to fork and electricity distribution grid balancing with guided electrical vehicle (EV) charging. SOFIE's main contribution is to provide interoperability between IoT systems while also enabling new functionality and business models.
2020 6th IEEE Conference on Network Softwarization (NetSoft)
2019 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)
This demo presents the deployment of two network slices with different QoS using a packet and opt... more This demo presents the deployment of two network slices with different QoS using a packet and optical networks for the deployment of multiple real-time communication suites. Two novel features of SONATA Service Platform are demonstrated: QoS-based network slices and WIM support through ONF Transport API.
2019 IEEE 2nd 5G World Forum (5GWF)
Electronics
The goal of the study presented in this paper is to evaluate the performance of a proposed transm... more The goal of the study presented in this paper is to evaluate the performance of a proposed transmission scheme in multiuser multiple-input multiple-output (MIMO) configurations, via code reuse. Hence, non-orthogonal multiple access (NOMA) is performed. To this end, a correlation matrix of the received data is constructed at the transmitter, with feedback as only the primary eigenvector of the equivalent channel matrix, which is derived after principal component analysis (PCA) at the receiver. Afterwards, users experiencing improved channel quality (i.e., diagonal terms of the correlation matrix) along with reduced multiple access interference (i.e., the inner product of transmission vectors) are the potential candidates for their assigned code to be reused. As the results indicate, considering various MIMO configurations, the proposed approach can achieve almost 33% code assignment gain (CAG), when successive interference cancellation (SIC) is employed in mobile receivers. However, ...
IEEE Open Journal of the Communications Society
Intrusion detection plays a critical role in cyber-security domain since malicious attacks cause ... more Intrusion detection plays a critical role in cyber-security domain since malicious attacks cause irreparable damages to cybersystems. In this work, we propose the I2SP prototype, which is a novel Information Sharing Platform, able to gather, preprocess, model, and distribute network-traffic information. Within the I2SP prototype we build several challenging deep feature learning models for network-traffic intrusion detection. The learnt representations will be utilized for classifying each new network measurement into its corresponding threat level. We evaluate our prototype's performance by conducting case studies using cybersecurity data extracted from the Malware Information Sharing Platform (MISP)-API. To the best of our knowledge, we are the first that combine the MISP-API in order to construct an information sharing mechanism that supports multiple novel deep feature learning architectures for intrusion detection. Experimental results justify that the proposed deep feature learning techniques are able to predict accurately MISP threat-levels.
Electronics
Ιn this review article, a comprehensive study is provided regarding the latest achievements in si... more Ιn this review article, a comprehensive study is provided regarding the latest achievements in simulation techniques and platforms for fifth generation (5G) wireless cellular networks. In this context, the calculation of a set of diverse performance metrics, such as achievable throughput in uplink and downlink, the mean Bit Error Rate, the number of active users, outage probability, the handover rate, delay, latency, etc., can be a computationally demanding task due to the various parameters that should be incorporated in system and link level simulations. For example, potential solutions for 5G interfaces include, among others, millimeter Wave (mmWave) transmission, massive multiple input multiple output (MIMO) architectures and non-orthogonal multiple access (NOMA). Therefore, a more accurate and realistic representation of channel coefficients and overall interference is required compared to other cellular interfaces. In addition, the increased number of highly directional beams ...
Journal of Sensor and Actuator Networks
5G is considered to be the technology that will accommodate the development and management of inn... more 5G is considered to be the technology that will accommodate the development and management of innovative services with stringent and diverse requirements from end users, calling for new business models from the industry. In this context, the development and efficient management of Network Services (NS) serving specific vertical industries and spanning across multiple administrative domains and heterogeneous infrastructures is challenging. The main challenges regard the efficient provision of NSs considering the Quality of Service (QoS) requirements per vertical industry along with the optimal usage of the allocated resources. Towards addressing these challenges, this paper details an innovative approach that we have developed for managing and orchestrating such NSs, called SONATA, and compare it with OSM and Cloudify, which are two of the most known open-source Management and Orchestration (MANO) frameworks. In addition to examining the supported orchestration mechanisms per MANO fr...
Sensors
The recent advancements in the fields of artificial intelligence (AI) and machine learning (ML) h... more The recent advancements in the fields of artificial intelligence (AI) and machine learning (ML) have affected several research fields, leading to improvements that could not have been possible with conventional optimization techniques. Among the sectors where AI/ML enables a plethora of opportunities, industrial manufacturing can expect significant gains from the increased process automation. At the same time, the introduction of the Industrial Internet of Things (IIoT), providing improved wireless connectivity for real-time manufacturing data collection and processing, has resulted in the culmination of the fourth industrial revolution, also known as Industry 4.0. In this survey, we focus on the vital processes of fault detection, prediction and prevention in Industry 4.0 and present recent developments in ML-based solutions. We start by examining various proposed cloud/fog/edge architectures, highlighting their importance for acquiring manufacturing data in order to train the ML a...
Electronics
The efficient deployment of fifth generation and beyond networks relies upon the seamless combina... more The efficient deployment of fifth generation and beyond networks relies upon the seamless combination of recently introduced transmission techniques. Furthermore, as multiple network nodes exist in dense wireless topologies, low-complexity implementation should be promoted. In this work, several wireless communication techniques are considered for improving the sum-rate performance of cooperative relaying non-orthogonal multiple access (NOMA) networks. For this purpose, an opportunistic relay selection algorithm is developed, employing single-antenna relays to achieve full-duplex operation by adopting the successive relaying technique. In addition, as relays are equipped with buffers, flexible half-duplex transmission can be performed when packets reside in the buffers. The proposed buffer-aided and successive single-antenna (BASSA-NOMA) algorithm is presented in detail and its operation and practical implementation aspects are thoroughly analyzed. Comparisons with other relevant al...
IEEE Transactions on Vehicular Technology
Sensors
The goal of this study was to investigate the performance of a realistic wireless sensor nodes de... more The goal of this study was to investigate the performance of a realistic wireless sensor nodes deployment in order to support modern building management systems (BMSs). A three-floor building orientation is taken into account, where each node is equipped with a multi-antenna system while a central base station (BS) collects and processes all received information. The BS is also equipped with multiple antennas; hence, a multiple input-multiple output (MIMO) system is formulated. Due to the multiple reflections during transmission in the inner of the building, a wideband code division multiple access (WCDMA) physical layer protocol has been considered, which has already been adopted for third-generation (3G) mobile networks. Results are presented for various MIMO orientations, where the mean transmission power per node is considered as an output metric for a specific signal-to-noise ratio (SNR) requirement and number of resolvable multipath components. In the first set of presented results, the effects of multiple access interference on overall transmission power are highlighted. As the number of mobile nodes per floor or the requested transmission rate increases, MIMO systems of a higher order should be deployed in order to maintain transmission power at adequate levels. In the second set of results, a comparison is performed among transmission in diversity combining and spatial multiplexing mode, which clearly indicate that the first case is the most appropriate solution for indoor communications.
Sensors
Hybrid cloud multi-access edge computing (MEC) deployments have been proposed as efficient means ... more Hybrid cloud multi-access edge computing (MEC) deployments have been proposed as efficient means to support Internet of Things (IoT) applications, relying on a plethora of nodes and data. In this paper, an overview on the area of hybrid clouds considering relevant research areas is given, providing technologies and mechanisms for the formation of such MEC deployments, as well as emphasizing several key issues that should be tackled by novel approaches, especially under the 5G paradigm. Furthermore, a decentralized hybrid cloud MEC architecture, resulting in a Platform-as-a-Service (PaaS) is proposed and its main building blocks and layers are thoroughly described. Aiming to offer a broad perspective on the business potential of such a platform, the stakeholder ecosystem is also analyzed. Finally, two use cases in the context of smart cities and mobile health are presented, aimed at showing how the proposed PaaS enables the development of respective IoT applications.
Uploads
Papers by Panagiotis Trakadas