Computer Engineering / Bilgisayar Mühendisliği
Permanent URI for this collectionhttps://hdl.handle.net/11147/10
Browse
32 results
Search Results
Now showing 1 - 10 of 32
Conference Object Citation - Scopus: 1A Lightweight and Energy Efficient Secrecy Outage Probability-Based Friendly Jamming(IEEE, 2023) Yaman, Okan; Ayav, Tolga; Erten, Yusuf MuratThird parties and legitimate entities can reach and process users' private data through most wireless networks. However, attackers such as intruders and eavesdroppers may also try to exploit this property in communication. Hence, wireless networks are intrinsically more vulnerable to threats, unlike their wired alternatives. Cryptographic techniques are the conventional approaches to deal with that weakness. Nevertheless, they still need to meet the requirements of contemporary technologies, including IoT nodes with energy and processing power constraints. In that respect, friendly jamming (FJ) is one of the encouraging countermeasures to overcome the mentioned susceptibility since it has an energy-efficient and computation-friendly nature. However, that promising approach brings another challenge, applicability. Although various models exist against this issue, a lightweight scheme compliant with novel technologies is needed. Hence, we propose a more straightforward FJ model evaluated on cellular network-based simulations in this study. Moreover, introducing a lightweight secrecy outage probability definition increases robustness and energy efficiency. © 2023 IEEE.Conference Object Citation - Scopus: 3A Novel Countermeasure for Selective Forwarding Attacks in Iot Networks(IEEE, 2022) Yaman, Okan; Sokat, Barış; Ayav, Tolga; Erten, Yusuf MuratAs the Internet of Things (IoT) devices become more widespread there are rising public concerns about whether or not IoT devices and their services are secure. One of the major threats they face is selective forwarding attacks performed by malicious nodes. Although packets can be lost inherently due to network conditions, malicious nodes, such as those performing blackhole attacks, may deliberately drop some, but not all of them. Therefore, distinguishing these nodes from legitimate ones is not so easy. This study has proposed a lightweight countermeasure to deal with this kind of attack in IoT networks, using the standard IPv6 Routing Protocol for Low Power and Lossy Networks (RPL). The mechanism is based on Mobile Trusted Nodes (MTNs). For the given threat model, we showed that our model has robust detection accuracy and brings no additional overhead to the network. © 2022 IEEE.Conference Object Citation - WoS: 2Citation - Scopus: 3Secure Iot Update Using Blockchain(IEEE, 2021) Kaptan, Melike; Tomur, Emrah; Ayav, Tolga; Erten, Yusuf MuratIn this study a platform is devised to send automatic remote updates for embedded devices. In this scenario there are Original Equipment Manufacturers (OEMs), Software suppliers, blockchain nodes, Gateways and embedded devices. OEMs and software suppliers are there to keep their software on Inter Planetary File System (IPFS) and send the meta-data and hashes of their software to the blockchain nodes in order to keep this information distributed and ready to be requested and used. There are also gateways which are the members of the blockchain and the IPFS network. Gateways are responsible for asking for a specific update for specific devices from IPFS database using the meta-data kept on the blockchain, and they will send those hashed secure updates to the devices. In order to provide a traceable data keeping platform, gateway update operations are handled as transactions in a second blockchain network which is the clockchain of the gateways. The system was implemented as of the two separate blockchain networks and it has been shown that, despite the calculation overhead of the member devices, by separating the functions between the two blockchain networks a more reliable and secure platform can be achieved.Article Otomotiv Endüstrisinde Zamanlama Mimarilerinin Değerlendirilmesi(TMMOB Elektrik Mühendisleri Odası, 2021) Saydam, Berkay; Ayav, TolgaTeknolojik gelişmeler araçlara da yansırken güvenlikten ödün vermeden araçlara yeni işlevler ekleme zorluğunu da beraberinde getirmektedir. Araçlarda kullanılan çeşitli işlevleri yerine getiren görevler farklı karakteristiklere sahiptir. Güvenlik ve performans, bu görevlerin karakteristiğini belirlemek için kullanılan iki temel kriterdir. Görevlerin karakteristikleri, Otomotiv Güvenlik Bütünlük Seviyeleri olarak bilinen güvenlik seviyelerine göre sınıflandırılabilir. Donanım ve yazılım tasarımı ile ayrıca bunların doğrulanması ve testi otomotiv endüstrisinde uzun soluklu bir ilerlemedir. Bir Elektronik Kontrol Birimi sahada kullanılmaya başlandığında, donanım tasarımındaki herhangi bir değişiklik oldukça maliyetlidir. Makalede savunulan hipoteze göre, Merkezi İşlem Birimi tarafından görev yürütme sıralarını belirlemek için kullanılan zamanlama algoritmaları özenle seçilmelidir. Ayrıca donanım ve yazılım tasarımında bu karakteristik ve algoritmalar dikkate alınmalıdır. Aksi takdirde görevler, kritik bileşen için zaman kısıtının kaçırılması gibi güvenlik açısından ciddi sorunlara neden olabilmektedir. Bu makalede, zamanlama mimarileri değerlendirilerek hangi zamanlama mimarilerinin hangi amaçla kullanılması gerektiği belirtilmektedir. Algoritmaların avantaj ve dezavantajları sunulmaktadır.Conference Object Citation - WoS: 12Citation - Scopus: 20Loyalty Program Using Blockchain(IEEE, 2020) Sönmeztürk, Osman; Ayav, Tolga; Erten, Yusuf MuratThe traditional loyalty systems usually offer people benefits in a specific sector. The users usually need to stay within the loyalty system for a long time and accumulate points in order to win rewards which may not be very interesting for them most of the time. Additionally, users usually do not prefer to share their personal information to join these loyalty systems due to privacy concerns. It has, therefore, been observed that the number of customers in the loyalty systems is decreasing day by day. To reduce these drawbacks a loyalty program which complies with ERC20 standards was proposed in this study using tokens based on the Ethereum blockchain. Using this new generation loyalty system, users can convert their earned tokens to Ether in the market and they can receive services or products with the accumulated tokens according to their interests from any supplier that has been contracted by the manufacturer. Additionally, users in the designed system do not need to carry many different cards, it is adequate to have only one Ethereum wallet. Furthermore, users do not need to share any personal data to join the loyalty system. Suppliers can also request Ether from the manufacturer for the tokens they have accumulated from the members of the loyalty system. The proposed loyalty system has been implemented and presented in this study.Article Ieee 802.11 Kablosuz Ağları için Bir Gerçek Zamanlı İletişim Protokolü(Dokuz Eylül Üniversitesi, 2017) Ayav, Tolga802.11 kablosuz ağları gerçek zamanlı uygulamaların gereksiniminlerini karşılayabilecek sağlıklı mekanizmalardan yoksundur. Bu çalışma, uygulama katmanında kolaylıkla gerçekleştirilebilen ve iletişim verimliliğini artırarak sistemi gerçek zamanlı uygulamaların beklenti seviyesine çıkartan bir protokol sunmaktadır. Protokol, seçilen bir merkez düğümün diğer düğümleri sorgulaması esasına dayanmakta olup, trafiğin zamanlaması En Yakın Zaman Sınırı İlk algoritması tarafından sağlanmaktadır. Değişken trafik yükleriyle baş edebilmek amacıyla, kanal kullanımını istenen seviyede tutacak bir geri beslemeli kontrol döngüsü de protokole eklenmiştir. İletişimin matematiksel modeli oluşturularak, kontrol döngüsünün kararlılık analizi gerçekleştirilmiştir. Ağın NS-3 benzetimleri, protokolün değişken trafik yüklerinde kanal kullanım oranını istenen seviyede tutabildiğini ve daha az paket kaybına ulaştığını göstermektedir.Conference Object Osek/vdx Uyumlu Katı Gerçek-zamanlı İşletim Sistemleri için Zamanlama Mimarilerinin Değerlendirilmesi(IEEE, 2020) Saydam, Berkay; Ayav, TolgaDeveloping technology is reflected to the vehicles as well. But it brings the challenge of adding new functionalities to vehicles without compromising safety. The chips, which are used to provide the functionalities, are determined in the first step of ECU design. This decision will effect the remaining part of the development. Designing hardware and software together with testing phase is a long process in automotive industry. Changing the design of the hardware is quite costly after an ECU begins to be used in field. For these reasons, the selection of chips is directly related to cost and the functionality which should be provided to customer. Tasks, which fulfill desired functionality, provide a balance between performance and safety. These were evaluated for an OSEK/VDX certified OS and results are presented from the scheduling algorithms point of view. © 2020 IEEE.Report Design Notes of Microprocessor U311.1(Izmir Institute of Technology, 2017) Ayav, TolgaThis handbook includes a part of the lecture notes of CENG 311 Computer Architecture course given in the undergraduate program of the Department of Computer Engineering at Izmir Institute of Technology. One aim of this course is to introduce the preliminaries of a general purpose microprocessor design. To this end, I aim to teach a very simple microprocessor which we call μ311.1 , an 16-bit processor with only 25 instructions. This document is intended to help the students with their laboratory works. In the experimental part of the course, students are expected to implement this or another similar processor using VHDL in order to attain a sufficient knowledge and intuition about “What is really happening inside a computer system?”. In other words, starting from typing printf("value:%d",*p); they must understand compiling, assembling, linking, loading the machine code and how processors execute this code. This document aims to give a very short and abstract answer to the above question. Students may find many parts missing, too short or incomplete. Nonetheless, I hope that this will be a good starting point for their deeper research as well as their study of computer architecture.Conference Object 13. Ulusal Yazılım Mühendisliği Sempozyumu(Izmir Institute of Technology, 2019) Ayav, Tolga; Tekir, Selma; Erten, MuratThe 13th National Software Engineering Symposium (UYMS) of Turkey was held Izmir Institute of Technology on 23-25 September 2019. There has been a great interest in this year’s symposium, as in previous years. UYMS is a platform which helps bring together the software industry and the academicians working in this area. It is being organized since 2003 and it plays an important role in shaping the future of the software industry in Turkey. We would like to thank all the participants whose contributions led to the successful realization of this symposium. We would also like to express our belief that these contributions will lead to a better and more productive efforts in the field of software engineering. Along with the main area of UYMS, in the thematic areas of Software Test Engineering, Software Engineering for Health, Software Modeling, and Graduate Theses, a total of 77 papers were accepted this year. At least three referees reviewed each paper and the papers were evaluated based on these reviews. We thank all the program committee members who served as referees.Conference Object Sonlu Durum Makinelerinin Fourier Analizi Tabanlı Sınanması(CEUR Workshop Proceedings, 2018) Takan, Savaş; Ayav, TolgaSonlu durum makinesi (FSM), devre ve yazılım testlerinde yaygın kullanıma sahip bir modelleme tekniğidir. FSM'lerin testi için literatürde çeşitli yöntemler bulunmakla birlikte, modellerin büyümesi sonucu test kümesinin büyüklüğü, hata yakalama oranı ve test üretim süresi gibi konularda yüksek başarıma sahip alternatif test yöntemlerine ihtiyaç bulunmaktadır. Bu çalışma ikili fonksiyonların Fourier analizine dayanan yeni bir test oluşturma yöntemi önermektedir. İlk sonuçlar, fonksiyonun frekans bileşenlerinden yararlanarak oluşturulan test takımının daha yüksek bir performansa sahip olduğunu göstermektedir. Önerilen yöntem, karakteristiği, maliyeti ve hata yakalama oranı üzerinden literatürden seçilen iki yöntemle karşılaştırılmıştır.
