1. Home
  2. Browse by Author

Browsing by Author "Tonyali, Samet"

Filter results by typing the first few letters
Now showing 1 - 4 of 4
  • Results Per Page
  • Sort Options
  • Loading...
    Thumbnail Image
    Conference Object
    Citation - Scopus: 7
    Performance Evaluation of TLS 1.3 Handshake on Resource-Constrained Devices Using NIST's Third Round Post-Quantum Key Encapsulation Mechanisms and Digital Signatures
    (Institute of Electrical and Electronics Engineers Inc., 2022) Saribas, Sultan; Tonyali, Samet
    Towards the end of the 20. century, quantum computing came into sight by the main effect of Shor's Algorithm. While this algorithm offers a solution for the factorization problem, which makes it exponentially faster, it alongside becomes a critical threat for the encryption schemes since mostly their security mechanisms rely on the difficulty of integer factorization or discrete log problems. Despite it is not known when advanced quantum computers will show up, yet, once it is developed, most existing cryptography will be rendered useless, which means all existing information security will be vulnerable. Owing to this risky situation, The National Institute of Standards and Technology (NIST) launched post-quantum cryptography (PQC) standardization process for the development of PQC schemes. In this paper, we have chosen three key encapsulation mechanisms and two digital signature algorithms with different parameter sets from the round three submissions. We measured their TLS 1.3 handshake performance using two resource-constrained devices and compared it to that of classical encryption and digital signature schemes. Experiment results showed that post-quantum algorithms come with an extra message overhead while their handshake delay values are promising. © 2022 Elsevier B.V., All rights reserved.
  • Loading...
    Thumbnail Image
    Article
    Privacy-Preserving Wireless Indoor Localization Systems
    (2023) Dedeturk, Beyhan Adanur; Kolukısa, Burak; Tonyali, Samet
    Recently the number of buildings and interior spaces has increased, and many systems have been proposed to locate people or objects in these environments. At present, several technologies, such as GPS, Bluetooth, Wi-Fi, Ultrasound, and RFID, are used for positioning problems. Some of these technologies provide good results for positioning outdoors whereas some others are effective for indoor environments. While GPS is used for outdoor localization systems, Wi-Fi, Bluetooth, Ultra WideBand, and RFID are used for indoor localization systems (ILSs). Today, due to the proliferation and extensive usage of Wi-Fi access points, wireless-based technologies in indoor localization are preferred more than others. However, even though the abovementioned technologies make life easier for their users, ILSs can pose some privacy risks in case the confidentiality of the location data cannot be ensured. Such an incident is highly likely to result in the disclosure of users’ identities and behavior patterns. In this paper, we aim to investigate existing privacy-preserving wireless ILSs and discuss them.
  • Loading...
    Thumbnail Image
    Book Part
    Citation - Scopus: 18
    A Review of Moving Target Defense Mechanisms for Internet of Things Applications
    (Wiley, 2020) Saputro, Nico; Tonyali, Samet; Aydeger, Abdullah; Akkaya, Kemal; Rahman, Mohammad A.; Uluagac, A. Selcuk
    The chapter presents a review of proactive Moving Target Defense (MTD) paradigm and investigates the feasibility and potential of specific MTD approaches for the resource-constrained Internet of Things (IoT) applications. The aim is not only to provide taxonomy of various MTD approaches but also to advocate MTD techniques in the dynamic network domain in conjunction with the emerging Software Defined Networking (SDN) for more effective proactive IoT defense. The Internet of Battlefield Things (IoBT) and Industrial IoT (IIoT), which subject to more attacks, are identified as two critical IoT domains that can reap from the SDN-based MTD approaches. Finally, the chapter also discusses potential future research challenges of the MTD approaches in the IoT domain. © 2025 Elsevier B.V., All rights reserved.
  • Loading...
    Thumbnail Image
    Conference Object
    Citation - Scopus: 9
    Security and Privacy Challenges, Solutions, and Open Issues in Smart Metering: A Review
    (Institute of Electrical and Electronics Engineers Inc., 2021) Win, Lae Lae; Tonyali, Samet
    The traditional power grid becomes ‘smart’ when it is combined with the communication and information technology. Along with smart grid, the traditional meter is replaced with smart meter. Smart meters play an important role in energy consumption reporting and, thereby, billing. Besides smart meters, the smart grid communication network is composed of heterogeneous devices that are communicating through public networks. Therefore, smart metering communications are susceptible to cyber-attacks and privacy breaches which are still under debating. This paper gives a brief overview of smart grid, smart metering, and the communication networks. Then, the privacy and security requirements of the smart grid network are derived. The various kind of cyber-attacks are discussed, after that, the different schemes and approaches that have been proposed in previous papers are reviewed. Lastly, the open issues on security and privacy of smart grid metering communications are highlighted. © 2022 Elsevier B.V., All rights reserved.