Selçuk Baktır

ORCID: 0000-0002-3478-5200
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Residue Arithmetic
  • Coding theory and cryptography
  • Cryptography and Data Security
  • Cryptographic Implementations and Security
  • Network Security and Intrusion Detection
  • Internet Traffic Analysis and Secure E-voting
  • Chaos-based Image/Signal Encryption
  • Smart Grid Security and Resilience
  • Mobile Ad Hoc Networks
  • Vehicular Ad Hoc Networks (VANETs)
  • Advanced Data Storage Technologies
  • Security in Wireless Sensor Networks
  • IPv6, Mobility, Handover, Networks, Security
  • Advanced Malware Detection Techniques
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Blockchain Technology Applications and Security
  • Electrostatic Discharge in Electronics
  • Network Packet Processing and Optimization
  • Embedded Systems Design Techniques
  • Caching and Content Delivery
  • Advanced Authentication Protocols Security
  • Numerical Methods and Algorithms
  • Low-power high-performance VLSI design
  • Energy Harvesting in Wireless Networks
  • Image Processing and 3D Reconstruction

American University of the Middle East
2019-2024

Bahçeşehir University
2012-2020

Worcester Polytechnic Institute
2004-2007

Hardware manufacturers are increasingly outsourcing their IC fabrication work overseas due to much lower cost structure. This poses a significant security risk for ICs used critical military and business applications. Attackers can exploit this loss of control substitute Trojan genuine ones or insert circuit into the design mask fabrication. We show that technique borrowed from side-channel cryptanalysis be mitigate problem. Our approach uses noise modeling construct set fingerprints/or an...

10.1109/sp.2007.36 article EN 2022 IEEE Symposium on Security and Privacy (SP) 2007-05-01

Voice over Internet Protocol (VoIP) networks are vulnerable to caller-ID (caller-identification) spoofing attacks due the open nature of Session Initiation (SIP) signaling. Caller-ID is a critical security threat in modern telecommunication systems, allowing attackers impersonate legitimate callers and gain access sensitive information. While these pose significant telecom financial industries, existing solutions limited only closed-circuit options for subscribers same service provider. In...

10.1109/access.2024.3393487 article EN cc-by-nc-nd IEEE Access 2024-01-01

We introduce a novel SIP based attack, named as the SR-DRDoS that exploits some less known features by using IP-spoofing technique, reflection attack logic and DDoS logic. Furthermore, we develop SIP-based DoS/DDoS simulator, Mr. SIP, use it to implement our attack. Our is shown dramatically increase CPU load of server from 0% up 100% in only 4 minutes after initiated. Since intelligent creates legitimate traffic on network methods, bypasses black-lists well IP, packet-count or...

10.1109/access.2020.3001688 article EN cc-by IEEE Access 2020-01-01

We implement elliptic curve cryptography on the MSP430 which is a commonly used microcontroller in wireless sensor network nodes. use number theoretic transform to perform finite field multiplication and squaring as required scalar point multiplication. take advantage of fast Fourier for first time literature speed up an efficient realization cryptography. Our implementation achieves only 0.65 s 1.31 fixed random points, respectively, has similar or better timing performance compared...

10.3390/s20051507 article EN cc-by Sensors 2020-03-09

Voice over Internet Protocol (VoIP) and its underlying Session Initiation (SIP) are widely deployed technologies since they provide an efficient fast means of both voice data communication a single network. However, in spite their advantages, also have security threats due to the inherent vulnerabilities (IP) that can potentially be exploited by hackers. This study introduces novel defense mechanism effectively combat advanced attacks exploit identified some less-known features SIP. The...

10.3390/app13031864 article EN cc-by Applied Sciences 2023-01-31

With advances in technology, wireless sensor networks (WSNs) have found new applications and their popularity has increased dramatically. In several applications, WSNs the potential to replace wired data communication systems, e.g. vehicular ad hoc (VANETs) they are natural option for communication. also proposed emerging smart grid. this study, authors merge these two application domains, i.e. VANET grids, propose a novel solution effective grid The authors’ scheme achieves task of...

10.1049/iet-its.2015.0058 article EN IET Intelligent Transport Systems 2016-05-12

As wireless sensor networks (WSNs) become more widespread, potential attacks against them also increase and applying cryptography becomes inevitable to make secure WSN nodes. nodes typically contain only a constrained microcontroller, such as MSP430, Atmega, etc., running public key on these devices is considered challenge. Since are spread around in the field, distribution of shared private key, which used symmetric cryptographic algorithm for securing communications, problem. Thus, it...

10.3390/s19132864 article EN cc-by Sensors 2019-06-27

We introduce an efficient way of performing polynomial multiplication in a class finite fields GF(pm) the frequency domain. The Fast Fourier Transform (FFT) based domain technique, originally proposed for integer multiplication, provides extremely method with best known asymptotic complexity, i.e. O(n log n n). Unfortunately, original FFT bears significant overhead due to conversions between time and domains, which makes it impractical perform relatively short (160 - 1024 bits) operands as...

10.1145/1185448.1185568 article EN 2006-03-10

Due to widespread adoption of mobile communications devices and increasingly high throughput capacity cellular networks, Third-Generation (3G) Long Term Evolution (LTE) are becoming ever more popular. Millions smart phones with 3G capabilities sold every year used for mostly browsing the Internet. Hence, operators have been heavily investing in their packet switched networks meet customer demand stay ahead market. The use broadband Internet bring along also some IP based threats such as...

10.3390/fi5040474 article EN cc-by Future Internet 2013-09-30

We introduce a new tower field representation, optimal fields (OTFs), that facilitates efficient finite operations. The recursive direct inversion method we present has significantly lower complexity than the known best for in extension (OEFs), i.e., Itoh-Tsujii's technique. of our algorithm is shown to be O(m/sup 2/), better Itoh-Tsujii algorithm, 2/(log/sub 2/m.)). This further improved log//sub 2//sup 3/) by utilizing Karatsuba-Ofman algorithm. In addition, show OTFs may converted OEF...

10.1109/tc.2004.83 article EN IEEE Transactions on Computers 2004-08-31

The smart grid is a decent idea for improving energy efficiency, however its functionality requires frequent exchange and processing of household electricity consumption data. On the other hand, high frequency data may reveal private personal information such as when person at home, she goes to bed, what time wakes up even which appliances uses. privacy this sensitive should be protected from utility company. Furthermore, companies consider outsourcing their communication tasks cloud avoid...

10.1109/icitcs.2014.7021799 article EN International Conference on IT Convergence and Security, ICITCS 2014-10-01

Abstract With its relatively small key size, elliptic‐curve cryptography (ECC) is considered as the public‐key cryptographic algorithm of choice for wireless sensor networks (WSNs). In this work, we implemented ECC in frequency domain, that is, by using number theoretic transform, and without hardware multiplier support, on constrained MSP430 microcontroller widely used WSNs. Our 169‐bit implementation uses Edwards curves performs scalar point multiplication only 1.97 0.98 s random fixed...

10.1002/sec.1670 article EN Security and Communication Networks 2016-11-18

Cryptographic primitives have increasingly emerged into embedded systems such as mobile phones, smart cards, and personal digital assistants. Elliptic Curve Cryptosystems (ECC) Hyperelliptic curve cryptosystems (HECC) are the of choice for asymmetric data encryption in environments where processor power storage limited [T. Wollinger et al. (2003)]. We introduce first cryptographic implementation Optimal Tower Fields (OTF) [S. Baktir (2003)], (2004)] HECC. Furthermore, we HECC over an...

10.1109/acssc.2004.1399187 article EN 2005-03-31

Wireless sensors, which are smaller and cheaper, have started being used in many different applications. Military applications, health care industrial monitoring, environmental smart grids, vehicular ad-hoc networks some of the best known applications wireless sensors. In especially military, environmental, it is required that communication between sensor nodes be encrypted to achieve privacy confidentiality. this work, modifications been made on-demand distance vector routing protocol,...

10.3906/elk-1809-23 article EN TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES 2019-07-26

Wireless sensor networks (WSNs) are the most commonly deployed technology in smart grid environments owing to their advantages including low cost and successful adoption various harsh environments. However, providing quality of service (QoS) requirements applications with WSNs is difficult because power constraints nodes unreliable wireless links. In order meet QoS using WSNs, this paper, we first propose a QoS-aware omnidirectional antenna-based medium access control (QODA-MAC). Then,...

10.1002/dac.3168 article EN International Journal of Communication Systems 2016-07-25
Coming Soon ...