Arama Sonuçları
Listeleniyor 1 - 10 / 19
Yayın Security analysis of coap and dtls protocols for internet of things applications(Işık Üniversitesi, 2019-08-26) Gürkan, Ali Tunca; Tüysüz Erman, Ayşegül; Işık Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği Yüksek Lisans ProgramıInternet of Things is a very fast growing area. Its requirements and related technologies are changing from day to day. In Internet of Things, devices can communicate with each other with different messaging protocols. The latest messaging protocols are well developed, but they are too heavy to be run on devices developed with old technology. Therefore, these devices have to be operated with old-fashioned protocols. This makes devices vulnerable to security risks. CoAP is a newly developed messaging protocol for constrained devices used in Internet of Things applications. The protocol is a variant of HTTP, so it has similar speci cations. CoAP does not have an embedded security mechanism. Therefore, another protocol called DTLS is used on top of it to provide security. DTLS has powerful functions like handshaking and session processes; however, it is weak against DoS attacks. In this study, we develop a security extension for Internet of Things devices using CoAP with DTLS for secure messaging. DTLS applies handshaking process for every received request. The handshaking process is the most time and resource consuming part of the communication. We propose a security extension to prevent unnecessary messaging during handshaking process of an attacker device that sends a lot of unauthenticated requests. When a client sends requests to a server that has the proposed security extension, the server counts unsuccessful handshaking processes for each client. If the count passes a limit of suspicious requests, the security extension on server adds the client's IP address into a banned IPs list. Until the expiration time, the server does not accept any request from the banned IP address. Our proposed security extension is tested in different scenarios to examine the effects on the network. The results of the experiments show that the enhanced security extension decreases delays on the network and it is helpful for communication between authenticated devices.Yayın Afghanistan's security: Political process, state-building and narcotics(Wiley-Blackwell, 2008-06) Aras, Bülent; Toktaş, ŞuleEstablishing political authority and constructing a state instrument would increase trust, which would contribute to stability.1 The lack of political institutions necessary for stability encourages the interference of individuals and groups with "special" interests, at both the state and societal levels.2 Stability is not only a prerequisite for the development of the political process and security within the country; it is also a risk to security, as it would require the involvement of groups and factors in the political process that might hinder security itself. [...] in a setting where fierce security measures are needed, running security operations without supplying adequate security personnel and munitions is an absolute risk.48 CONCLUSION The long-term objective for Afghanistan is to strengthen the state structurally and to set mechanisms in place that would prevent it from working only for narrow or factional interests.Yayın A hybrid approach to private record matching(IEEE Computer Soc, 2012-10) İnan, Ali; Kantarcıoğlu, Murat; Ghinita, Gabriel; Bertino, ElisaReal-world entities are not always represented by the same set of features in different data sets. Therefore, matching records of the same real-world entity distributed across these data sets is a challenging task. If the data sets contain private information, the problem becomes even more difficult. Existing solutions to this problem generally follow two approaches: sanitization techniques and cryptographic techniques. We propose a hybrid technique that combines these two approaches and enables users to trade off between privacy, accuracy, and cost. Our main contribution is the use of a blocking phase that operates over sanitized data to filter out in a privacy-preserving manner pairs of records that do not satisfy the matching condition. We also provide a formal definition of privacy and prove that the participants of our protocols learn nothing other than their share of the result and what can be inferred from their share of the result, their input and sanitized views of the input data sets (which are considered public information). Our method incurs considerably lower costs than cryptographic techniques and yields significantly more accurate matching results compared to sanitization techniques, even when privacy requirements are high.Yayın Ipwall design and implementation of a gateway frewall on linux(Işık Üniversitesi, 2004) Durak, Erdem; Yarman, Bekir Sıddık Binboğa; Işık Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği Yüksek Lisans ProgramıThe aim of the this project is to develop a firewall which will have functionailities in a regular firewall also will have the missing functions like configuring firewall from any platform and any location via internet or local network. In the beginning of this project information is collected about firewalls and firewalls were examined that work on Windows and Linux operating systems in order to see the differences. On linux operating system source kernel allowed us to implement packet filtering firewall. IPWALL is a firewall which can be used as a gateway firewall also it can be used to secure a local area network. IPWALL key features are stablity, web-based interface which allows configuring firewall form any operating system; it is highly configurable and easy maintainable Linux Firewall. IPWALL communicates with kernel to check and manage network security with packet filtering. By web-based interface IPWALL provides easy and advanced configurable options for novice and expert users. The aim is to continue our improvements on IPWALL as gateway firewall and IPCUBE as personel firewall an share our knowledge of this project in open source community.Yayın Performance and security issues in e-payment systems: pay on-line case(Işık Üniversitesi, 2006-06) Karahasan, Orhan; Kuru, Selahattin; Işık Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği Yüksek Lisans ProgramıIn this thesis, we report an experience on Performance and Security issues in E-Payment systems. We develop an E-Payment system which covers all introduced performance and security measures written in this thesis. We also compare different types of means that can be used in E-Payment systems. We mentioned different types of network architectures, and their benefits and drawbacks for E-Payment systems. An example e-payment system called Pay ON-LINE is developed with the proposed security and performance architectures. This system is in use in Şile campus of Isik University.Yayın Ontological insecurity, anxiety, and hubris: an affective account of Turkey-KRG relations(International Relations Council of Turkey, 2022-03-10) Kayhan Pusane, Özlem; Ilgıt, AslıGiven Iraqi Kurds’ special place in Turkey’s ‘biographical narrative’, Turkey-Iraqi Kurdish Regional Government (KRG) relations are not simply strategic or economic but also highly affectively charged. These relations involve emotional encounters filled with anxiety, pride, anger, and disappointment that generate concerns for not only Turkey’s physical security but also its ontological security. This paper traces the emotional context of Turkey-KRG relationship. It suggests that a combination of Turkey’s deep-rooted ‘anxiety’ and ‘hubris’ toward the Iraqi Kurds prevented the emergence of a close partnership between these two actors and fostered merely a ‘fragile rapprochement’ since 2008.Yayın Ipcube personal firewall on linux(Işık Üniversitesi, 2004-06) Pamukçu, Örge Anıl; Koç, Çetin Kaya; Işık Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği Yüksek Lisans ProgramıThe aim of this project is to developing a personal firewall which will have functionalities in a regular firewall also will have the missing functions like configuring firewall from any platform and any location via internet or local network. There is no many user-friendly personal firewalls works on Linux operating system. In the beginning of this study differences and common properties of firewalls examined. IPCUBE is designed and developed to collect good features of firewalls on a personal firewall. It provides stable, secure open sourced, web- based, highly configurable and easy maintained Linux Firewall. IPCUBE is designed on Iptable future of Linux. It uses Iptable commands to check and manage network with packet filtering concept. Its web-based console provides easy and highly configurable options to the non-technic users. All of the TPCUBE's functionalities can be managed on this web-based console. The aim is to continue our improvements on IPWALL as gateway firewall and IPCUBE as personal firewall and share our knowledge of this project in open source community.Yayın The role of context in desecuritization: Turkish foreign policy towards Northern Iraq (2008–2017)(Routledge, 2020-05-26) Kayhan Pusane, ÖzlemFor decades, Turkish policymakers have perceived the possible emergence of a Kurdish autonomous region or an independent Kurdish state in northern Iraq as an existential threat to Turkey. However, from 2008 onwards, under the Justice and Development Party government, Turkish foreign policy towards the Iraqi Kurdistan Regional Government (KRG) was gradually desecuritized. In light of Turkey?s experience, this paper explores the role of context in desecuritizing foreign policy issues in general and Turkish foreign policy towards the KRG in particular. It argues that the changing civil?military relations in Turkey as well as the country?s broader political and economic conjuncture allowed for the desecuritization of Turkey-KRG relations from 2008 onwards. The context also determined what kind of a desecuritization Turkey experienced towards the KRG.Yayın A survey on Near Field Communication (NFC) technology(Springer, 2013-08) Coşkun, Vedat; Özdenizci Köse, Büşra; Ok, KeremNear Field Communication (NFC) as a promising short range wireless communication technology facilitates mobile phone usage of billions of people throughout the world that offers diverse services ranging from payment and loyalty applications to access keys for offices and houses. Eventually NFC technology integrates all such services into one single mobile phone. NFC technology has emerged lately, and consequently not much academic source is available yet. On the contrary, due to its promising business case options, there will be an increasing amount of work to be studied in the very close future. This paper presents the concept of NFC technology in a holistic approach with different perspectives, including communication essentials with standards, ecosystem and business issues, applications, and security issues. Open research areas and further recommended studies in terms of academic and business point of view are also explored and discussed at the end of each major subject's subsection. This comprehensive survey will be a valuable guide for researchers and academicians as well as for business world interested in NFC technology.Yayın Turkey’s struggle with the PKK and civilian control over the Turkish Armed Forces(Routledge Journals, Taylor & Francis Ltd, 2016-05-03) Kayhan Pusane, ÖzlemAlthough most scholars of Turkey’s civil-military relations argue that the Kurdistan Workers’ Party (PKK) insurgency has led to a decrease in civilian control over the Turkish military from the 1980s onwards, this has not always been the case. This article argues that the presence or the degree of the PKK threat is not sufficient to explain the civil-military balance of power in Turkey throughout the 1980s and the 1990s. Instead, the article shows that in the face of the PKK threat, three major factors have influenced the behaviours of both civilian and military policy-makers in Turkey and shaped the level of civilian control. These factors are first, the Turkish political leaders’ control over their political parties and these parties’ control of a majority of seats in the parliament; second, how negatively or positively the military perceives the political leadership; and third, European Union pressures for democratisation.












