Browsing by Author "Catak, Ferhat Ozgur"
Now showing 1 - 5 of 5
- Results Per Page
- Sort Options
Article Citation - WoS: 4Citation - Scopus: 5Deployment and Implementation Aspects of Radio Frequency Fingerprinting in Cybersecurity of Smart Grids(Mdpi, 2023) Awan, Maaz Ali; Dalveren, Yaser; Catak, Ferhat Ozgur; Kara, AliSmart grids incorporate diverse power equipment used for energy optimization in intelligent cities. This equipment may use Internet of Things (IoT) devices and services in the future. To ensure stable operation of smart grids, cybersecurity of IoT is paramount. To this end, use of cryptographic security methods is prevalent in existing IoT. Non-cryptographic methods such as radio frequency fingerprinting (RFF) have been on the horizon for a few decades but are limited to academic research or military interest. RFF is a physical layer security feature that leverages hardware impairments in radios of IoT devices for classification and rogue device detection. The article discusses the potential of RFF in wireless communication of IoT devices to augment the cybersecurity of smart grids. The characteristics of a deep learning (DL)-aided RFF system are presented. Subsequently, a deployment framework of RFF for smart grids is presented with implementation and regulatory aspects. The article culminates with a discussion of existing challenges and potential research directions for maturation of RFF.Article Citation - WoS: 7Citation - Scopus: 8Flexible and Lightweight Mitigation Framework for Distributed Denial-Of Attacks in Container-Based Edge Networks Using Kubernetes(Ieee-inst Electrical Electronics Engineers inc, 2024) Koksal, Sarp; Catak, Ferhat Ozgur; Dalveren, YaserMobile Edge Computing (MEC) has a significant potential to become more prevalent in Fifth Generation (5G) networks, requiring resource management that is lightweight, agile, and dynamic. Container-based virtualization platforms, such as Kubernetes, have emerged as key enablers for MEC environments. However, network security and data privacy remain significant concerns, particularly due to Distributed Denial-of-Service (DDoS) attacks that threaten the massive connectivity of end-devices. This study proposes a defense mechanism to mitigate DDoS attacks in container-based MEC networks using Kubernetes. The mechanism dynamically scales Containerized Network Functions (CNFs) with auto-scaling through an Intrusion Detection and Prevention System (IDPS). The architecture of the proposed mechanism leverages distributed edge clusters and Kubernetes to manage resources and balance the load of IDPS CNFs. Experiments conducted in a real MEC environment using OpenShift and Telco-grade MEC profiles demonstrate the effectiveness of the proposed mechanism against Domain Name System (DNS) flood and Yo-Yo attacks. Results also verify that Kubernetes efficiently meets the lightweight, agile, and dynamic resource management requirements of MEC networks.Article Citation - WoS: 2Citation - Scopus: 3Modelling and Design of Pre-Equalizers for a Fully Operational Visible Light Communication System(Mdpi, 2023) Bostanoglu, Murat; Dalveren, Yaser; Catak, Ferhat Ozgur; Kara, AliNowadays, Visible Light Communication (VLC) has gained much attention due to the significant advancements in Light Emitting Diode (LED) technology. However, the bandwidth of LEDs is one of the important concerns that limits the transmission rates in a VLC system. In order to eliminate this limitation, various types of equalization methods are employed. Among these, using digital pre-equalizers can be a good choice because of their simple and reusable structure. Therefore, several digital pre-equalizer methods have been proposed for VLC systems in the literature. Yet, there is no study in the literature that examines the implementation of digital pre-equalizers in a realistic VLC system based on the IEEE 802.15.13 standard. Hence, the purpose of this study is to propose digital pre-equalizers for VLC systems based on the IEEE 802.15.13 standard. For this purpose, firstly, a realistic channel model is built by collecting the signal recordings from a real 802.15.13-compliant VLC system. Then, the channel model is integrated into a VLC system modeled in MATLAB. This is followed by the design of two different digital pre-equalizers. Next, simulations are conducted to evaluate their feasibility in terms of the system's BER performance under bandwidth-efficient modulation schemes, such as 64-QAM and 256-QAM. Results show that, although the second pre-equalizer provides lower BERs, its design and implementation might be costly. Nevertheless, the first design can be selected as a low-cost alternative to be used in the VLC system.Article Citation - WoS: 9Citation - Scopus: 12On the Performance of Energy Criterion Method in Wi-Fi Transient Signal Detection(Mdpi, 2022) Mohamed, Ismail; Dalveren, Yaser; Catak, Ferhat Ozgur; Kara, AliIn the development of radiofrequency fingerprinting (RFF), one of the major challenges is to extract subtle and robust features from transmitted signals of wireless devices to be used in accurate identification of possible threats to the wireless network. To overcome this challenge, the use of the transient region of the transmitted signals could be one of the best options. For an efficient transient-based RFF, it is also necessary to accurately and precisely estimate the transient region of the signal. Here, the most important difficulty can be attributed to the detection of the transient starting point. Thus, several methods have been developed to detect transient start in the literature. Among them, the energy criterion method based on the instantaneous amplitude characteristics (EC-a) was shown to be superior in a recent study. The study reported the performance of the EC- a method for a set of Wi-Fi signals captured from a particular Wi-Fi device brand. However, since the transient pattern varies according to the type of wireless device, the device diversity needs to be increased to achieve more reliable results. Therefore, this study is aimed at assessing the efficiency of the EC-a method across a large set ofWi-Fi signals captured from variousWi-Fi devices for the first time. To this end, Wi-Fi signals are first captured from smartphones of five brands, for a wide range of signalto-noise ratio (SNR) values defined as low (3 to 5 dB), medium (5 to 15 dB), and high (15 to 30 dB). Then, the performance of the EC-a method and well-known methods was comparatively assessed, and the efficiency of the EC-a method was verified in terms of detection accuracy.Article Radar Emitter Localization Based on Multipath Exploitation Using Machine Learning(Ieee-inst Electrical Electronics Engineers inc, 2024) Catak, Ferhat Ozgur; Al Imran, Md Abdullah; Dalveren, Yaser; Yildiz, Beytullah; Kara, AliIn this study, a Machine Learning (ML)-based approach is proposed to enhance the computational efficiency of a particular method that was previously proposed by the authors for passive localization of radar emitters based on multipath exploitation with a single receiver in Electronic Support Measures (ESM) systems. The idea is to utilize a ML model on a dataset consisting of useful features obtained from the priori-known operational environment. To verify the applicability and computational efficiency of the proposed approach, simulations are performed on the pseudo-realistic scenes to create the datasets. Well-known regression ML models are trained and tested on the created datasets. The performance of the proposed approach is then evaluated in terms of localization accuracy and computational speed. Based on the results, it is verified that the proposed approach is computationally efficient and implementable in radar detection applications on the condition that the operational environment is known prior to implementation.

