Yazar "Demir, Alper Kamil" seçeneğine göre listele
Listeleniyor 1 - 18 / 18
Sayfa Başına Sonuç
Sıralama seçenekleri
Öğe A Named Data Networking Stack for Contiki NG OS(IEEE, 2022) Bilgili, Sedat; Demir, Alper KamilThe current Internet has become the dominant use with continuing growth in the home, medical, health, smart cities, and industrial automation applications which are enabled by smart objects (constrained devices). These devices sense, gather and actuate information in their deployed environment. This concept is called as Internet of Things (IoT). In other words, IoT phenomenon is an emerging technology enabling such applications in our lives. IoT is regarded as a fourth industrial revolution because of it extensive coverage of services and applications. Intrinsically, Internet architecture and protocols has become a natural approach to apply to IoT design. However, despite the success of the Internet architecture and protocols, recent research has been reporting the deficiencies of this approach. IoT-based applications demand content oriented services. However, Internet design is host-centric. This architectural departure has led the researches into design of Future Internet Architectures (FIAs). Among them, Named data Networking (NDN) is also emerging as a promising FIA where it fits the communication needs of IoT networks typically. As a result, NDN architecture and protocols are considered to be implemented for IoT devices. Nevertheless, there are only a few implementation exists currently. Because of all of these reasons, we have aimed to provide design and implementation detail of a light-weight NDN protocol stack, called as mu NDN, running on Contiki Operating System (OS) for constrained IoT devices. Contiki is an OS that is developed for constrained IoT devices. In this study, an NDN protocol stack that can work on top of IEEE 802.15.4 link and physical layers has been developed and presented. As far as we know, there is no any fully-functional open source NDN implementation in Contiki OS.Öğe A Named Data Networking Stack for Contiki NG OS(Institute of Electrical and Electronics Engineers Inc., 2022) Bilgili, Sedat; Demir, Alper KamilThe current Internet has become the dominant use with continuing growth in the home, medical, health, smart cities, and industrial automation applications which are enabled by smart objects (constrained devices). These devices sense, gather and actuate information in their deployed environment. This concept is called as Internet of Things (IoT). In other words, IoT phenomenon is an emerging technology enabling such applications in our lives. IoT is regarded as a fourth industrial revolution because of it extensive coverage of services and applications. Intrinsically, Internet architecture and protocols has become a natural approach to apply to IoT design. However, despite the success of the Internet architecture and protocols, recent research has been reporting the deficiencies of this approach. IoT-based applications demand content oriented services. However, Internet design is host-centric. This architectural departure has led the researches into design of Future Internet Architectures (FIAs). Among them, Named data Networking (NDN) is also emerging as a promising FIA where it fits the communication needs of IoT networks typically. As a result, NDN architecture and protocols are considered to be implemented for IoT devices. Nevertheless, there are only a few implementation exists currently. Because of all of these reasons, we have aimed to provide design and implementation detail of a light-weight NDN protocol stack, called as ? textNDN, running on Contiki Operating System (OS) for constrained IoT devices. Contiki is an OS that is developed for constrained IoT devices. In this study, an NDN protocol stack that can work on top of IEEE 802.15.4 link and physical layers has been developed and presented. As far as we know, there is no any fully-functional open source NDN implementation in Contiki OS. © 2022 IEEE.Öğe Advancing artificial intelligence-enabled cybersecurity for the internet of things(IGI Global, 2021) Demir, Alper Kamil; Alam, ShahidInternet of things (IoT) has revolutionized digital transformation and is present in every sector including transportation, energy, retail, healthcare, agriculture, etc. While stepping into the new digital transformation, these sectors must contemplate the risks involved. The new wave of cyberattacks against IoT is posing a severe impediment in adopting this leading-edge technology. Artificial intelligence (AI) is playing a key role in preventing and mitigating some of the effects of these cyberattacks. This chapter discusses different types of threats and attacks against IoT devices and how AI is enabling the detection and prevention of these cyberattacks. It also presents some challenges faced by AI-enabled detection and prevention and provides some solutions and recommendations to these challenges. The authors believe that this chapter provides a favorable basis for the readers who intend to know more about AI-enabled technologies to detect and prevent cyberattacks against IoT and the motivation to advance the current research in this area. © 2021 by IGI Global. All rights reserved.Öğe Avatar: Uzaktan Sağlık Hizmetleri Için Bilgi Merkezli Nesnelerin İnterneti Ağ Mimarisi Ve Protokolleri(2022) Demir, Alper Kamil; Manap, Gökçe; Bilgili, SedatSon yıllarda elektronik ve tümleşik devrelerdeki gelişmeler insan vücudu üzerinde giyilebilir veya implante edilebilir küçük ve akıllı tıbbi cihazların ve kameraların geliştirilmesine öncülük etmiştir. Bu cihazlar aracılığı ile insan üzerindeki fizyolojik veriler toplanabilir ve kamera gözetimi yapılabilir. Bu cihazlara kablosuz haberleşme ünitesi takıldığında bir ağ ortamında fizyolojik veri toplama ve haberleşme özelliği kazanırlar. Örneğin: Nabız oksimetri algılayıcısı ile kişilerin kalp atışı, kandaki oksijen doyum seviyesi ve derideki kan hacminin değişim seviyesi ölçülebilir. ECG algılayıcısı ile kişinin kalp fonksiyonları takip edilebilir. EMG algılayıcısı ile kişilerin kas fonksiyonları takip edilebilir. EEG algılayıcısı ile kişilerin beyin aktiviteleri takip edilebilir. BP algılayıcısı ile kişilerin organ hasarı ve kardiyovasküler durumu takip edilebilir. Hareket algılayıcıları ile kişilerin aktiviteleri takip edilebilir. Böyle bir kablosuz haberleşme ağı örneğin bir evde, hastanede, bakım evinde veya huzurevinde hastaların takibinde kullanılabilir. Hastaların fizyolojik verileri ve kamera görüntüleri İnternet üzerinden bir hasta gözetim merkezine (örneğin bir hastaneye) iletildiğinde hastaların sağlık durumları ile ilgili uzaktan gözetim yapılabilir AVATAR projesinin bir ilk-örneği üniversitemizin araştırma laboratuvarında yer alan test yatağında gerçekleştirilecektir. Bu nedenle uygulamanın evde, hastanede, bakım evinde veya huzurevinde gerçekleştirilmesine gerek yoktur. AVATAR projesi üniversitemizin araştırma laboratuvarında yürütüleceği için hayati işaret verileri laboratuvarda gönüllü çalışacak öğrenciler üzerinden toplanacaktır. Gerekli etik kurul kararı alınmıştır ve ekte sunulmuştur. İnsan üzerindeki fizyolojik verileri toplayan algılayıcıların ve kameraların bazıları araştırma laboratuvarlarında veya sanayide geliştirilmiştir. Bu cihazlar Nesnelerin İnterneti ortamında kullanılabilir. AVATAR projesinde fizyolojik algılayıcılarla donatılmış bireylerin sağlık durumlarını gösteren verilerin ve kamera görüntülerinin en etkin hangi bilgi merkezli ağ protokolleriyle ve algoritmalarıyla bir hasta gözlem merkezine İnternet aracılığı ile iletilmesi problemi üzerine çalışılacaktır. Yani bireylerin sağlık verileri ve kamera görüntüleri Nesnelerin İnterneti ortamında CCN-Lite/802.15.4 protokol katmanı üzerinden bir ara-geçide, ara-geçit üzerinden de bir hasta gözlem merkezine iletilecektir. CCN-Lite bilgi merkezli ağ yaklaşımlarından biri olan CCNx?in kaynakları kısıtlı Nesnelerin İnterneti cihazları için geliştirilmiş bir sürümüdür. Literatürde CCN-Lite ile birlikte çalışan az sayıda yönlendirme protokolü bulunsa da bu protokollerin performans analizi üzerine bir çalışma bulunmamaktadır. Bu nedenle AVATAR projesinde CCN-Lite ile birlikte çalışacak bireylerin hayati sağlık verilerini ve kamera görüntülerini taşıyacak daha verimli yönlendirme protokolleri de geliştirilecektir. Bireylerin fizyoloji verilerinin ve kamera görüntülerinin bir hasta gözetim merkezine gerçek-zamanlı olarak iletilmesi de önem arz eder. AVATAR projesinde CCN-Lite üzerinde çalışacak gerçek-zamanlı veri aktarımı sağlayacak bir uygulama katmanı protokolü de geliştirilecektir. Böylelikle bireylerin fizyoloji sağlık verilerini ve kamera görüntülerini uçtan uca taşıyan AVATAR uygulaması çalışır hale getirilecektir. Özetle, AVATAR projesi kapsamında bireylerin hayati işaret verilerinin ve kamera görüntülerinin en verimli bilgi merkezli Nesnelerin İnterneti ağ protokolleri ile bir hasta gözlem merkezine iletilmesi üzerine çalışılacaktır.Öğe Comparison of CoAP and CoCoA Congestion Control Mechanisms in Grid Network Topologies(2018) Demir, Alper Kamil; Abut, FatihThe Internet of Things (IoT) is a vision of the future Internet. Due to limited resources of IoT devices, a new generationof protocols and algorithms are being developed and standardized. The Constrained Application Protocol (CoAP) hasbeen designed by the Internet Engineering Task Force (IETF) for application layer communication. CoAP is based onUser Datagram Protocol (UDP), a simple transport layer protocol that does not handle congestion within the network.However, the phenomenon of congestion in IoT networks is also a major problem. Thus, the core CoAP specificationoffers a basic CoAP congestion control (CC) mechanism based on retransmission timeout (RTO) with binaryexponential backoff (BEB). Default CoAP CC is insensitive to network conditions. Thus, to improve the default CoAPCC, CoAP Simple Congestion Control/Advanced (CoCoA), defined in a draft specification, is being standardized by theIETF CoRE working group. Nevertheless, comparison of default CoAP CC and CoCoA has not been sufficientlyinvestigated in the literature. In this paper, we investigate and present comparison of default CoAP CC and CoCoA interms of throughput (i.e. number of requests/second) by varying number of concurrent clients where each clientcontinuously sends back-to-back traffic to servers residing in 1x6, 3x6 and 5x6 grid network topology. Our results showthat CoCoA is not always better than default CoAP CC in terms of throughput in some scenarios. As a result, designand development of new CoAP CC mechanisms are open to research.Öğe Data-driven modelling and prediction of coap throughput in a grid network topology(TUBITAK, 2020) Demir, Alper Kamil; Abut, FatihIn this study, we propose new models for predicting the average throughput in a 4x4 grid Constrained Application Protocol (CoAP)-based IoT network using Support Vector Machine (SVM) and Multiple Linear Regression (MLR). Two different CoAP congestion control mechanisms have been considered: the default CoAP congestion control (CC) and the CoAP Simple Congestion Control/Advanced (CoCoA). On the client-side, we run 3, 6, 9, 12 or 15 CoAP clients requesting packets, sized with 12, 24, 36 or 48 bytes, from different CoAP servers over 4x4 grid IoT network configured with packet delivery ratios of 90, 95 or 100. In total, 60 different experimental scenarios, each of which was run 10 times to determine the average throughput of default CoAP CC and CoCoA clients, were created. Using 10-fold cross-validation, the performance of the prediction models has been evaluated using several performance metrics. The results show that combining packet delivery ratio and number of concurrently sending clients in a model leads to the highest correlation with the average CoAP throughput of the IoT network. Particularly, this model produces the lowest prediction error among all SVM-based and MLR-based models, regardless of whether the default CoAP CC or CoCoA is used as the congestion control mechanism. © 2020, TUBITAK. All rights reserved.Öğe Determination of the Ideal Protocol Stack for the Transmission of Health Data over 6LoWPAN IoT Networks(2020) Bilgili, Sedat; Demir, Alper KamilIt is expected that almost every day electronic devices will be connected to the existing internet infrastructure in the context of Internet of Things (IoT). These devices will enable to sense and actuate the physical world. It is foreseen that miniaturized e-health devices will enable monitoring vital health of patients. There exist some studies on networking these e-health devices within the Internet. In this realm, several network protocols are being standardized. 6LoWPAN of IETF is one of these efforts where some set of protocols can be stacked over IEEE 802.15.4 radio. However, it is not clear that which ideal protocol stack for transmission of health data can be adopted well. The novelty of this work is that we studied determination of ideal protocol stack for transmitting health data over 6LoWPAN IoT networks. So then, we carried extensive simulations over Cooja simulator. The compelling results are presented in this work. The results show that 6LoWPAN IoT health networks can be used to serve vital health data of patients.Öğe DIGEST: a decentralized divergecast scheduling algorithm for IEEE 802.15.4e TSCH in the internet of things(Springer, 2021) Demir, Alper Kamil; Bilgili, SedatInternet of Things is emerging as a commercial phenomenon. It is conjectured that billions of appliances will be connected within the current Internet infrastructure by 2020. These networked appliances require low-power radio and reliability. Hence, IEEE brought up a very efficient, reliable and deterministic time-frequency enabled medium access control protocol, IEEE 802.15.4e time slotted channel hopping (TSCH), on top of low power IEEE 802.15.4 radio for the industrial market. IEEE 802.15.4e TSCH is able to run a communication schedule for MAC upon a communication schedule is built. However, the issue of how such scheduling will be made, updated, and maintained is beyond the scope of the IEEE 802.15.4e TSCH standard. The unit responsible for these tasks is also out of its scope. That means, required scheduling mechanism is absent in this standard. In order to complete this gap, several communication scheduling algorithms are introduced in the literature. In this study, we first introduce another decentralized divergecast communication scheduling algorithm, called as DIGEST, where divergecast implies that network traffic moves in any directions opposed to convergecast where network traffic moves from leave nodes to root. That DIGEST algorithm tries to schedule time slots by selecting a neighbor node at first. When choosing a neighbor node, it tries to make almost equal number of dedicated time slots to each neighbor. In this way, it can provide better schedules with neighbor nodes than other scheduling algorithms. We evaluate the effectiveness of DIGEST, Diva, and Berkeley's Aloha-based scheduling algorithms under static and mobile environments by running extensive simulations. Our simulation results indicate that the DIGEST algorithm is superior to the others in terms of the neighbor connectivity ratio.Öğe Hayati Sağlık Verilerinin CoAP Observe Yöntemi ile İletilmesi ve Analizi(2022) Manap, Gökçe; Demir, Alper KamilNesnelerin İnterneti (IoT), son zamanların en çok tercih edilen teknolojilerinden biridir. Günümüzde IoT'nin günlük hayatta kullanımı artmakta ve zamanla daha da artması beklenmektedir. IoT cihazları, herhangi bir kullanıcıya ihtiyaç duymadan birbirleriyle otomatik olarak iletişim kurabilir, diğer cihazlardan veri alabilir veya üzerlerindeki sensörler aracılığıyla veri üretebilir. IoT, akıllı şehir sistemlerinde, ev otomasyon sistemlerinde, trafikte ve diğer birçok alanda kullanılabilir. IoT sisteminin kullanıldığı alanlardan biri de sağlık sektörüdür. Sağlık teknolojisinde IoT sistemleri, hastaların sağlık verilerinin otomatik olarak alınmasında, izlenmesinde ve işlenmesinde önemli bir rol oynar. Kalabalık bir ortamda olmak istemeyen veya evde bakıma ihtiyaç duyan yaşlı hastaların uzaktan izlenip tedavi edilmeleri gerekebilir. Bu durumlara çözüm olarak bireylerin sağlık verilerini toplayıp bir sağlık kuruluşuna bu verileri hızlı ve güvenilir şekilde iletmek için bir IoT sistemi tasarlanabilir. IoT sistemleriyle çalışan ağ protokol yığınlarının performansının analiz edilmesi sistemin en iyi protokol kombinasyonunu bulmak adına oldukça faydalı olacaktır.Bu çalışmada, kişilerin nabzı, glikoz seviyesi, kalp grafiği gibi sağlık verilerini iletmek için CoAP (Constrained Application Protocol)-Observe kullanılmış ve bu yöntemin performans analizi yapılmıştır. Yapılan performans analizinde sonuçların değerlendirilmesi için gecikme, enerji verimliliği, güvenilirlik ve işlem hacmi gibi 4 farklı metrik belirlenmiştir. MAC (Media Access Control) protokollerinden CSMA (Carrier Sense Multiple Access), nullMAC ve RDC (Radio Duty Cycle) protokollerinden contikiMAC, nullRDC protokolleri kullanılarak 4 farklı senaryo ve 3 farklı PDR (Packet Delivery Ratio) değeri (100, 95, 90) kullanılarak toplam 12 farklı senaryo değerlendirmesi yapılmıştır.Öğe IfNot: An approach towards mitigating interest flooding attacks in Named Data Networking of Things(Elsevier, 2024) Bilgili, Sedat; Demir, Alper Kamil; Alam, ShahidNamed Data Networking (NDN) has emerged as a model to accommodate content distribution, security, and mobility. Recently, NDN has been applied to the Internet of Things (IoT), referred to as Named Data Networking of Things (NDNoT). In the rapidly evolving landscape of the NDNoT securing data transmission is paramount. The main purpose and contribution of the research presented in this paper is to safeguard the security vulnerabilities of data transmission in NDNoT. This paper specifically addresses the critical issue of interest flooding attacks in NDNoT. These attacks can disrupt network operations posing far-reaching threats to data integrity and availability. To mitigate these attacks and threats the paper introduces the IfNoT mechanism and evaluates its performance through comprehensive simulations in a realistic and recognized simulator, called Cooja. IfNot identifies the potential interest flooding attacker nodes in the NDNoT environment. It reduces the impact of the attack and the undesirable interest traffic caused by such an attack, which optimizes the network resource utilization at a maximum level. The study also explores the influence of key parameters provided by the IfNoT mechanism. Moreover, the study also identifies optimum settings for these parameters to enhance network utilization. When evaluated using various metrics, including success rate, average latency, and total interest traffic, under different conditions and parameter settings, IfNoT was able to counter the interest flooding attacks effectively. IfNoT mechanism is able to increase success ratio up to 28%, decrease average latency up to 31%, and decrease total interest traffic up to 58%.Öğe Medical Data Retrieval By Named Data Networking of Things Architecture in Contiki NG OS(Institute of Electrical and Electronics Engineers Inc., 2022) Demir, Alper Kamil; Manap, GokceInternet of Things (IoT) is becoming an important approach to accomplish healthcare monitoring where critical medical data retrieval is essential in a secure and private manner. Nevertheless, IoT devices have constrained resources. Therefore, acquisition of efficient, secure and private data is very challenging. The current research on applying architecture of Named Data Networking (NDN) to IoT design reveals very promising results. Therefore, we are motivated to combine NDN and IoT, which we call NDN-IoT architecture, for a healthcare application. Inspired by the idea, we propose a healthcare monitoring groundwork integrating NDN concepts into IoT in Contiki NG OS at the network layer that we call µNDN as it is a micro and light-weight implementation. We quantitatively explore the usage of the NDN-IoT approach to understand its efficiency for medical data retrieval. Reliability and delay performances were evaluated and analyzed for a remote health application. Our results, in this study, show that the µNDN architecture performs better than IP architecture when retrieving medical data. Thus, it is worth exploring the µNDN architecture further. © 2022 IEEE.Öğe Mining Android Bytecodes through the Eyes of Gabor Filters for Detecting Malware(Zarka Private Univ, 2023) Alam, Shahid; Demir, Alper KamilOne of the basic characteristics of a Gabor filter is that it provides useful information about specific frequencies in a localized region. Such information can be used in locating snippets of code, i.e., localized code, in a program when transformed into an image for finding embedded malicious patterns. Keeping this phenomenon, we propose a novel technique using a sliding Window over Gabor filters for mining the Dalvik Executable (DEX) bytecodes of an Android application (APK) to find malicious patterns. We extract the structural and behavioral functionality and localized information of an APK through Gabor filtered images of the 2D grayscale image of the DEX bytecodes. A Window is slid over these features and a weight is assigned based on its frequency of use. The selected Windows whose weights are greater than a given threshold, are used for training a classifier to detect malware APKs. Our technique does not require any disassembly or execution of the malware program and hence is much safer and more accurate. To further improve feature selection, we apply a greedy optimization algorithm to find the best performing feature subset. The proposed technique, when tested using real malware and benign APKs, obtained a detection rate of 98.9% with 10-fold cross-validation.Öğe mlCoCoA: a machine learning-based congestion control for CoAP(Tubitak Scientific & Technological Research Council Turkey, 2020) Demir, Alper Kamil; Abut, FatihInternet of Things (IoT) is a technological invention that has the potential to impact on how we live and how we work by connecting any device to the Internet. Consequently, a vast amount of novel applications will enhance our lives. Internet Engineering Task Force (IETF) standardized the Constrained Application Protocol (CoAP) to accommodate the application layer and network congestion needs of such IoT networks. CoAP is designed to be very simple where it employs a genuine congestion control (CC) mechanism, named as default CoAP CC leveraging basic binary exponential backoff. Yet efficient, default CoAP CC does not always utilize the network dynamics the best. As a result, CoCoA has been exposed to better utilize the IoT networks. Although CoCoA considers the network dynamics, the RTO calculation of CoCoA is based on constant coefficient values. However, our experiments show that these constant values, in general, do not achieve the best throughput. Inspired by these observations, we propose a new machine learning-based CC mechanism called as mlCoCoA that is a variation of CoCoA. Particularly, mlCoCoA sets retransmission timeout (RTO) estimation parameters of CoCoA adaptively by using a machine learning method. In this study, we applied support vector machines on a self-created dataset to develop new models for improving the throughput of the IoT network with dynamic selection of CoCoA coefficient values. We carried out extensive simulations in Cooja environment coupled with Californium. Our results indicate that compared to the performance of default CoAP CC and CoCoA mechanisms, mlCoCoA has merit in terms of improving the throughput of CoAP applications.Öğe NESNELERİN İNTERNETİ AĞLARINDA TIKANIKLIK KONTROL MEKANİZMALARI İLE RPL AMAÇ FONKSİYONLARININ KARŞILIKLI PERFORMANS ANALİZİ(2022) Söyü, Rıdvan; Demir, Alper Kamil; Özel, Selma AyşeFiziksel nesnelerin duyargalar ve yazılımlar aracılığıyla sürekli olarak haberleşmesini sağlamak için geliştirilen Nesnelerin İnterneti (IoT) teknolojileri gün geçtikçe hayatımıza daha fazla girmektedir. Ancak, IoT ağları henüz IP ağlarındaki gibi standartlara sahip değildir. Bu ağlar için mevcut protokollerin ne kadar yeterli olduğu ve yeni protokollere ihtiyaç olup olmadığı hala araştırma konusudur. Tıkanıklık kontrolü de bu konulardan biri olup, IoT ağlarındaki sürekli ve yoğun bilgi akışından dolayı büyük öneme sahiptir. IoT ağlarında IP ağlarının aksine UDP tercih edildiğinden tıkanıklık kontrolü uygulama katmanında CoAP tarafından yapılır. Literatürde farklı CoAP tıkanıklık kontrol mekanizmaların karşılaştırıldığı performans analizleri bulunsa da CoAP tıkanıklık kontrol mekanizmaları ile yönlendirme protokolü RPL'in farklı amaç fonksiyonları arasındaki ilişkiyi ve performansa etkisini inceleyen bir çalışma bulunmamaktadır. Bu çalışma kapsamında farklı protokoller kullanılarak tasarlanan ağ yığını kombinasyonları Cooja benzetim ortamında araştırılmıştır. İstemci sayısının 3 ve 9, paket teslim oranı değerinin ise %80, %90 ve %100 olarak alındığı tüm benzetimlerden elde edilen ortalama gecikme ve işlem hacmi metrikleri incelendiğinde Objective Function 0 (OF0)’ın, Minimum Rank of Hysteresis Objective Function (MRHOF) algoritmasına göre daha iyi performans gösterdiğini ve CoCoA Strong'un en iyi performans gösteren tıkanıklık kontrolü mekanizması olduğu görülmüştür.Öğe On the Forwarding Information Base Sizing in Named Data Networking of Things(Institute of Electrical and Electronics Engineers Inc., 2022) Manap, Gokce; Bilgili, Sedat; Demir, Alper KamilNamed Data Networking (NDN) is a new network architecture derived from the success of the Internet. Specifically, NDN addresses and identifies data by naming. Source and destination host addresses are not required for data communication in the NDN because the data is uniquely named instead. In the NDN network, the Forwarding Information Base (FIB) table is responsible for data forwarding, the Pending Interest Table (PIT) is liable for holding the state of data forwarding process, and the Content Store (CS) is used to stock data chunks within the network to optimize the forwarding time to the data without contacting to the content producer. All these data structures consume the memory of devices existing in the Named Data Networking of Things (NDNoT). Accordingly, the size of the FIB, PIT and CS needs to be carefully adjusted in NDNoT environments for performance tuning and Quality of Service (QoS) provisioning. In this study, we explore the issues of FIB sizing on average and maximum occupancy, reliability and maximum delay for constant bit rate (CBR) traffic where each content producer is addressed with a prefix name in the Cooja simulator environment. The results indicate that FIB table size has an impact on the reliability and maximum delay. During the number of records in FIB outpaces the count of nodes in the network, the reliability decreases gradually. Therefore, in constrained NDNoT environment careful allocation of the memory among FIB, PIT and CS becomes an important issue. According to our knowledge so far, this work is the first study showing the effect of FIB table on the performance in an NDNoT environment. © 2022 IEEE.Öğe SIFT: Sifting file types-application of explainable artificial intelligence in cyber forensics(Springernature, 2024) Alam, Shahid; Demir, Alper KamilArtificial Intelligence (AI) is being applied to improve the efficiency of software systems used in various domains, especially in the health and forensic sciences. Explainable AI (XAI) is one of the fields of AI that interprets and explains the methods used in AI. One of the techniques used in XAI to provide such interpretations is by computing the relevance of the input features to the output of an AI model. File fragment classification is one of the vital issues of file carving in Cyber Forensics (CF) and becomes challenging when the filesystem metadata is missing. Other major challenges it faces are: proliferation of file formats, file embeddings, automation, We leverage and utilize interpretations provided by XAI to optimize the classification of file fragments and propose a novel sifting approach, named SIFT (Sifting File Types). SIFT employs TF-IDF to assign weight to a byte (feature), which is used to select features from a file fragment. Threshold-based LIME and SHAP (the two XAI techniques) feature relevance values are computed for the selected features to optimize file fragment classification. To improve multinomial classification, a Multilayer Perceptron model is developed and optimized with five hidden layers, each layer with ixn\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$i \times n$$\end{document} neurons, where i = the layer number and n = the total number of classes in the dataset. When tested with 47,482 samples of 20 file types (classes), SIFT achieves a detection rate of 82.1% and outperforms the other state-of-the-art techniques by at least 10%. To the best of our knowledge, this is the first effort of applying XAI in CF for optimizing file fragment classification.Öğe Siren: Standart Nesnelerin İnterneti Protokolleriyle Hayati Sağlık Verilerinin Taşınması(2022) Demir, Alper Kamil; Baydere, ŞebnemSon yıllarda elektronik ve tümlesik devrelerdeki gelismeler insan vücudu üzerinde giyilebilir saglık algılayıcılarının üretilmesine olanak saglamıstır. Bu saglık algılayıcıları insan üzerine takıldıgında fizyolojik insan saglık verilerinin toplanması mümkündür. Bu saglık algılayıcıları kablosuz haberlesme üniteleri ile birlestirildiginde bir kablosuz haberlesme agı olusturulabilir. Böyle bir kablosuz haberlesme agı bir evde, hastanede, huzur evinde ve haberlesme altyapısı olmayan daglık bir bölgede hastaların takibinde kullanılabilir. Bu kablosuz haberlesme agı standart Nesnelerin Interneti (NI) protokolleriyle Internete baglanabilir ve saglık verileri bir hasta gözetim merkezine iletilebilir. Siren projesi kapsamında bireylerin saglık verileri CoAP/UDP/IPv6/6LoWPAN/802.15.4 protokol katmanı üzerinden RPL yönlendirme protokolleri ile bir hasta gözetim merkezine iletilecektir. Özetle, Siren projesi kapsamında bireylerin hayati saglık verilerinin en verimli standart Nesnelerin Interneti protokolleri ile bir hasta gözetim merkezine iletilmesi üzerine çalısılacaktır.Öğe The Design and Implementation of an Information Centric Networking Architecture in Contiki NG OS(Institute of Electrical and Electronics Engineers Inc., 2022) Demir, Alper Kamil; Bilgili, SedatInformation Centric Networking (ICN) has been proposed as an encouraging remedy for solving complications of traditional IP based architecture. In this work, we present the design and implementation of an ICN framework in Contiki NG OS, a prominent operating system (OS) for constrained IoT devices that have limited computing and communication capabilities. Elementary end-to-end communication paradigms of Named Data Networking (NDN), inspired from ICN concepts and proposed as one of Future Internet Architectures (FIA), is integrated to Contiki NG OS developed for low-power and constrained Internet of Things (IoT) devices. Our results demonstrate the expediency of using the NDN concept for constrained IoT devices in Contiki NG OS. © 2022 IEEE.