Master Degree / Yüksek Lisans Tezleri

Permanent URI for this collectionhttps://hdl.handle.net/11147/3008

Browse

Search Results

Now showing 1 - 8 of 8
  • Master Thesis
    Blockchain Based Context Aware Access Control Structure Implementation for Security of Internet of Things System
    (01. Izmir Institute of Technology, 2022) Kul, Aslı; Demirörs, Onur; Erten, Yusuf Murat
    Nowadays, Internet of Things (IoT) devices, which have started to be included in our lives with the developing technology, are one of the popular working topics. While they are a means of transporting many important data in terms of usage areas, IoT devices have brought security concerns due to their being a new technology and technical limitations. The use of standard access control algorithms is insufficient for IoT environments due to their complexity and dynamism. In this study, considering the importance of sensitive critical data carried by IoT environments, Context Aware IoT Rule Based Access Control Algorithm, which is a proposed algorithm to ensure the security of interaction with IoT environments, is aimed to be integrated and used to create a reliable IoT environment by taking advantage of the security promising Blockchain technology. It is due to the use of distributed and cryptography methods that are widely used today.
  • Master Thesis
    Blackhole Attacks in Iot Networks
    (01. Izmir Institute of Technology, 2020) Sokat, Barış; Ayav, Tolga; Erten, Yusuf Murat
    IoT technologies are very popular today, and they are used in almost every field. Therefore, the number of IoT devices used is increasing day by day. Like every field in computer networks, security is quite important in IoT networks. However, the resource-constrained nature of IoT devices makes the study of security measures for IoT networks very challenging. In the literature research conducted before this thesis study, it was seen that it can perform a wide variety of RPL-based attacks on IoT networks. One of these attacks is the blackhole attack. Although the black hole attack is functionally simple, the damage it causes in the network can be extremely destructive. As far as it is known, in addition to the limited number of studies in this field of attack, the black hole attack used in the studies in this field has also basic features. The basic feature mentioned here is that the attacker node that will perform a black hole attack drops all the packets that come to it. When the attacker node drops all incoming packets, it causes the topology to change in the network, the number of control messages to increase and the attacker node to be isolated from the network in a short time. However, blackhole attack can be combined with different attacks. Therefore, in this thesis, the node that will perform the black hole attack is designed to allow control messages to pass, while dropping all other packets. Here, it is aimed that the attacker node remains on the network for a longer time. As a result, as long as the attacker node is active, it will be able to drop more packets and the number of control messages in the network will be controlled since the topology does not change. With the black hole attack developed as a result of the simulation tests, the number of control messages released in the network was taken under control and it was observed that the attacker node could remain in the network throughout the simulation period. Thus, the effect of different types of black hole attacks on the network that can be developed has been revealed.
  • Master Thesis
    Internet of things simulation using cisco packet tracer
    (01. Izmir Institute of Technology, 2020) Thera, David; Ayav, Tolga; Erten, Yusuf Murat
    Nowadays, the term IoT (internet of things) have become extremely important in our life. This technology is used in many fields such as education, health, industries, agriculture and infrastructures. In order to learn and understand how this technology works, many practical learning tools are used. The aim of the thesis is to introduce a iot simulation tool, where student can simulate or build and manage the systems for better understanding of the philosophy behind iot networks. The tool used is Cisco packet tracer which is a software developed by Cisco that is used to create and simulate a virtual network, basically a wireless network, without the need for any network hardware. The tool is free of charge, and suitable to work with almost all the operating systems. Cisco packet tracer allows users to have a practical networking technology knowledge. In this thesis, "Cisco packet tracer" is used to design an internet-based home automation system or smart home.
  • Master Thesis
    Blockchain Application on Loyalty Card
    (Izmir Institute of Technology, 2020) Sönmeztürk, Osman; Ayav, Tolga; Erten, Yusuf Murat
    Today, traditional loyalty systems are insufficient to meet the needs of users. The users need to stay within the loyalty system for a long time and accumulate points in order to win prizes and besides, the rewards they receive may be out of their interest. In addition, users usually forget the awards they have won in traditional loyalty systems and have difficulty in following up rewards. In addition to that, users usually do not prefer to share their personal information to join loyalty systems due to privacy concerns. Therefore, the number of customers in the loyalty systems is decreasing day by day. The designed loyalty program mentioned in this thesis works with IZTECH Tokens, which works on the Ethereum chain and are created by following ERC20 standards. Thanks to the new generation loyalty system, users can convert their earned tokens to Ethereum on the stock exchange without accumulating them or can receive services or products with the accumulated tokens according to their interests from a market that has been contracted by the manufacturer. Additionally, users in the designed system do not need to carry many cards, it is adequate to have only one Ethereum wallet. Furthermore, users do not need to share any personal data to join the loyalty system. Markets can request Ether from the manufacturer according to the number of tokens they have accumulated. The loyalty system mentioned in this thesis not only aims to establish a win-win relationship between the manufacturer, market, and client but also to find solutions to the customer problems mentioned above.
  • Master Thesis
    Block-Chain Based Remote Update for Embedded Devices
    (Izmir Institute of Technology, 2019) Kaptan, Melike; Ayav, Tolga; Erten, Yusuf Murat
    This research work is an attempt to devise a platform to send automatic remote updates for embedded devices. In this scenario there are Original Equipment Manufacturers (OEMs), Software suppliers, Block-Chain nodes, Gateways and embedded devices. OEMs and software suppliers are there to keep their software on IPFS (Inter Planetary File System) and send the meta-data and hashes of their software to the Block-Chain nodes in order to keep this information distributed and ready to be requested and used. There are also gateways which are also the members of the Block-Chain and IPFS network. Gateways are responsible for asking for a specific update for specific devices from IPFS database using the meta-data standing on the Block-Chain. And they will send those hashed secure updates to the devices. In order to provide a traceable data keeping platform gateway update operations are handled as a transactions in the second block-chain network which is the clock-chain of the gateways. In this study implementation of the two block chain shows us that, even though the calculation overhead of the member devices, with regulations specific to the applications block-chains provide applicable platforms.
  • Master Thesis
    Extended Topology Analysis of a Detection Mechanism Implementation Against Botnet Based Ddos Flooding Attack in Sdn
    (Izmir Institute of Technology, 2019) Karakış, Emre; Erten, Yusuf Murat; Tomur, Emrah
    When SDN comes up as a new technology, while it also brings many benefits such as high availability, scalability and performance, it also brings us new vulnerabilities that is targeted by attackers. Botnet Based DDoS Flooding Attacks have been one of the major problems for service provider networks who encountered these repeatedly since the first DDoS came into existence in the early 2000’s. In this thesis, we mainly concentrate on the source-based detection approach against Botnet Based DDoS Flooding Attack by combining the strength of SDN and s-Flow-RT technology. The main purpose of this research is to detect Botnet Based DDoS Flooding Attack that can also be performed in distributed SDN environments by using a similar approach with an available detection mechanism which is not implemented previously on an extended network with more network elements in order to observe whether the obtained successful results on the small network are compatible with a result obtained on this research. This study also includes a detection application using previously studied detection approach based on statistical inference model. The detection application is tested on virtual environments by organizing a Botnet Based DDoS Flooding Attacks on a predefined source node and then test results show that the mechanism could effectively detect the attack.
  • Master Thesis
    Context Aware Role Based Access Control Model for Internet of Things Applications
    (Izmir Institute of Technology, 2018) Genç, Didem; Erten, Yusuf Murat; Tomur, Emrah
    As the day goes on, both the academic and industrial studies related with IoT is increasing with the advance of technology, and this progresses require development of new security approaches aiming this domain. Despite the presence of many studies interested in security of IoT applications, they are just the implementation of currently security methods to IoT scenarios. IoT applications contain the interaction of different kinds of vast amount of thing(computer, process, people, service etc.). Therefore it is going to be inadequate and inefficient to try defining the interaction between these things, and providing security through execution of predefined static security policies. By considering these problems, we can conclude that new generation IoT needs an security mechanism which must offer fine-grained and dynamic access control. In the scope of this thesis, we design a context-aware role based access control model that provides dynamism by using attribute based access control model’s attribute function, and fine-granularity with usage of context term, by considering the security needs of IoT domain.
  • Master Thesis
    A framework for generalized syllogisms
    (Izmir Institute of Technology, 2018) Çine, Ersin; Erten, Yusuf Murat
    Reasoning is an indispensable action both for natural intelligence and for artificial intelligence. In automated reasoning, relatively expressive logics are used to define and derive complex facts about the real world. Many facts cannot be expressed in inexpressive logics such as syllogistic logic and thus, those logics are naturally ignored for automated reasoning. Despite their inexpressiveness, logics with intuitive propositions can provide two advantages: favorable complexity properties for reasoning tasks, and better correspondence with the natural language statements. Syllogistic logic, the first known formal logic in history, is so intuitive that it is often studied by cognitive scientists in order to understand and model human reasoning. The problem is that its syntax and semantics do not allow for representing much knowledge. Hence, propositions of syllogistic logic should be generalized with useful extensions without sacrificing the advantageous properties much. The aim of this thesis work is to bridge the gap between syllogistic reasoning and automated reasoning via designing the underlying logic and framework for performing time-efficient fully-automated deduction over generalized syllogistic propositions. In this thesis work, we define a practical family of generalized syllogistic logics, reveal the theoretical properties of those logics and their relationships with some other logics, and specify comprehensive frameworks with alternative representations and methods.