Computer Engineering / Bilgisayar Mühendisliği

Permanent URI for this collectionhttps://hdl.handle.net/11147/10

Browse

Search Results

Now showing 1 - 7 of 7
  • Conference Object
    Citation - Scopus: 1
    A Lightweight and Energy Efficient Secrecy Outage Probability-Based Friendly Jamming
    (IEEE, 2023) Yaman, Okan; Ayav, Tolga; Erten, Yusuf Murat
    Third parties and legitimate entities can reach and process users' private data through most wireless networks. However, attackers such as intruders and eavesdroppers may also try to exploit this property in communication. Hence, wireless networks are intrinsically more vulnerable to threats, unlike their wired alternatives. Cryptographic techniques are the conventional approaches to deal with that weakness. Nevertheless, they still need to meet the requirements of contemporary technologies, including IoT nodes with energy and processing power constraints. In that respect, friendly jamming (FJ) is one of the encouraging countermeasures to overcome the mentioned susceptibility since it has an energy-efficient and computation-friendly nature. However, that promising approach brings another challenge, applicability. Although various models exist against this issue, a lightweight scheme compliant with novel technologies is needed. Hence, we propose a more straightforward FJ model evaluated on cellular network-based simulations in this study. Moreover, introducing a lightweight secrecy outage probability definition increases robustness and energy efficiency. © 2023 IEEE.
  • Conference Object
    Citation - Scopus: 3
    A Novel Countermeasure for Selective Forwarding Attacks in Iot Networks
    (IEEE, 2022) Yaman, Okan; Sokat, Barış; Ayav, Tolga; Erten, Yusuf Murat
    As the Internet of Things (IoT) devices become more widespread there are rising public concerns about whether or not IoT devices and their services are secure. One of the major threats they face is selective forwarding attacks performed by malicious nodes. Although packets can be lost inherently due to network conditions, malicious nodes, such as those performing blackhole attacks, may deliberately drop some, but not all of them. Therefore, distinguishing these nodes from legitimate ones is not so easy. This study has proposed a lightweight countermeasure to deal with this kind of attack in IoT networks, using the standard IPv6 Routing Protocol for Low Power and Lossy Networks (RPL). The mechanism is based on Mobile Trusted Nodes (MTNs). For the given threat model, we showed that our model has robust detection accuracy and brings no additional overhead to the network. © 2022 IEEE.
  • Conference Object
    Citation - WoS: 2
    Citation - Scopus: 3
    Secure Iot Update Using Blockchain
    (IEEE, 2021) Kaptan, Melike; Tomur, Emrah; Ayav, Tolga; Erten, Yusuf Murat
    In this study a platform is devised to send automatic remote updates for embedded devices. In this scenario there are Original Equipment Manufacturers (OEMs), Software suppliers, blockchain nodes, Gateways and embedded devices. OEMs and software suppliers are there to keep their software on Inter Planetary File System (IPFS) and send the meta-data and hashes of their software to the blockchain nodes in order to keep this information distributed and ready to be requested and used. There are also gateways which are the members of the blockchain and the IPFS network. Gateways are responsible for asking for a specific update for specific devices from IPFS database using the meta-data kept on the blockchain, and they will send those hashed secure updates to the devices. In order to provide a traceable data keeping platform, gateway update operations are handled as transactions in a second blockchain network which is the clockchain of the gateways. The system was implemented as of the two separate blockchain networks and it has been shown that, despite the calculation overhead of the member devices, by separating the functions between the two blockchain networks a more reliable and secure platform can be achieved.
  • Article
    Citation - Scopus: 1
    Performance Analysis and Feature Selection for Network-Based Intrusion Detection With Deep Learning
    (Türkiye Klinikleri, 2022) Caner, Serhat; Erdoğmuş, Nesli; Erten, Yusuf Murat
    An intrusion detection system is an automated monitoring tool that analyzes network traffic and detects malicious activities by looking out either for known patterns of attacks or for an anomaly. In this study, intrusion detection and classification performances of different deep learning based systems are examined. For this purpose, 24 deep neural networks with four different architectures are trained and evaluated on CICIDS2017 dataset. Furthermore, the best performing model is utilized to inspect raw network traffic features and rank them with respect to their contributions to success rates. By selecting features with respect to their ranks, sets of varying size from 3 to 77 are assessed in terms of classification accuracy and time efficiency. The results show that recurrent neural networks with a certain level of complexity can achieve comparable success rates with state-of-the-art systems using a small feature set of size 9; while the average time required to classify a test sample is halved compared to the complete set.
  • Conference Object
    Citation - WoS: 12
    Citation - Scopus: 20
    Loyalty Program Using Blockchain
    (IEEE, 2020) Sönmeztürk, Osman; Ayav, Tolga; Erten, Yusuf Murat
    The traditional loyalty systems usually offer people benefits in a specific sector. The users usually need to stay within the loyalty system for a long time and accumulate points in order to win rewards which may not be very interesting for them most of the time. Additionally, users usually do not prefer to share their personal information to join these loyalty systems due to privacy concerns. It has, therefore, been observed that the number of customers in the loyalty systems is decreasing day by day. To reduce these drawbacks a loyalty program which complies with ERC20 standards was proposed in this study using tokens based on the Ethereum blockchain. Using this new generation loyalty system, users can convert their earned tokens to Ether in the market and they can receive services or products with the accumulated tokens according to their interests from any supplier that has been contracted by the manufacturer. Additionally, users in the designed system do not need to carry many different cards, it is adequate to have only one Ethereum wallet. Furthermore, users do not need to share any personal data to join the loyalty system. Suppliers can also request Ether from the manufacturer for the tokens they have accumulated from the members of the loyalty system. The proposed loyalty system has been implemented and presented in this study.
  • Conference Object
    Citation - WoS: 1
    Citation - Scopus: 3
    Context-Aware Operation-Based Access Control for Internet of Things Applications
    (Institute of Electrical and Electronics Engineers Inc., 2019) Genç, Didem; Tomur, Emrah; Erten, Yusuf Murat
    Recently, interest of both the academic and industrial world in Internet of Things (IoT) has been increasing and this trend requires development of new security approaches addressing potential weaknesses in this domain. Despite the presence of many studies directed towards security of IoT applications, they are mostly adoption of current methods to IoT scenarios. Yet, IoT applications are comprised of various kinds of different entities including computers, processes, people and services. Therefore, it is inadequate to detect malicious attempts by using conventional security methods, which apply fixed security policies and do not take interaction of things, that is context information, into account. In this study, by considering new security requirements of next generation IoT applications, we propose a fine-grained, dynamic and easily manageable access control model, which is called context-aware operation-based access control.
  • Article
    Citation - WoS: 1
    Citation - Scopus: 1
    Accounting for Product Similarity in Software Project Duration Estimation
    (World Scientific Publishing Co. Pte Ltd, 2016) Taştekin, Semra Yılmaz; Erten, Yusuf Murat; Bilgen, Semih
    We extend an existing model proposed for estimating project duration for industrial projects in general, to software intensive systems projects. We show, through nine different cases studies from different sectors, that product similarity, measured in terms of requirements reuse, can be incorporated into that model to improve its applicability in software intensive systems projects.