Browsing Computer Science by Author "(ORCID & YÖK ID 165356) Kalkan, Kübra"
Now showing items 1-6 of 6
-
BCPriPIoT: BlockChain utilized privacy-preservation mechanism for IoT devices
Kashif, Muhammad; Çakmakçı, Kübra Kalkan (IEEE, 2021)Security and privacy are the primary concerns for IoT devices but because of their inherent limitation both in terms of processing and energy, IoT devices cannot be deployed at their full scale. To alleviate such security ... -
CWT-DPA: Component-wise waiting time for BC-enabled data plane authentication
Latah, Majd; Çakmakçı, Kübra Kalkan (Elsevier, 2022-11-24)Software-Defined Networking (SDN) is a promising networking paradigm that brings central management and network programmability to improve existing networking systems. However, SDN has several security threats due to its ... -
DPSec: A blockchain-based data plane authentication protocol for SDNs
Latah, Majd; Çakmakçı, Kübra Kalkan (IEEE, 2020-11-02)Software-Defined Networking (SDN) is a promising networking architecture that enables central management along with network programmability. However, SDN brings additional security threats due to untrusted control and data ... -
SeCaS: Secure capability sharing framework for IoT devices in a structured P2P network
Aktypi, A.; Çakmakçı, Kübra Kalkan; Rasmussen, K. B. (The ACM Digital Library, 2020-03-16)The emergence of the internet of Things (IoT) has resulted in the possession of a continuously increasing number of highly heterogeneous connected devices by the same owner. To make full use of the potential of a personal ... -
SUTSEC: SDN Utilized trust based secure clustering in IoT
Çakmakçı, Kübra Kalkan (Elsevier, 2020-09-04)Internet of Things (IoT) technology consists of huge number of heterogeneous devices that create enormous amount of data. Providing a robust communication for billions of devices is one of the most significant challenges ... -
TruSD: Trust framework for service discovery among IoT devices
Çakmakçı, Kübra Kalkan (Elsevier, 2020-09-04)IoT provides an environment which enables access to a plethora of different services. In order to reach these services, devices need to decide if the providers are trustable or not. The decision to trust a node with whom ...
Share this page