Loading [MathJax]/extensions/MathMenu.js
Mumin Cebe - IEEE Xplore Author Profile

Showing 1-18 of 18 results

Filter Results

Show

Results

Threat Modeling, a shift-left cybersecurity activity to build security into a software design, has become a challenge for many industries, including Modern Medical Devices. With the advancement of Large Language Models (LLM), more industries are adopting this phenomenon to understand and solve domain-specific challenges. However, thus far, little research has evaluated the effectiveness of LLM in ...Show More
Threat Modeling is one of the key tools used to identify cyber threats and evaluate the risks of cyber threats against Modern Medical Devices (MMDs). However, there is no existing study that investigates how MMD manufacturers utilize and perceive existing threat modeling methodologies. To address this gap, we conducted a survey involving 81 participants from many MMD manufacturing companies. Our r...Show More
Recent developments in low-rate wide-area wireless technologies will enable the deployment of publish–subscribe architectures that can span larger geographical areas in the smart grid. In such a setting, typically, there is a lot of data exchange due to the increased number of multicasts/broadcasts among any device. Thus, using technologies such as long range wide area network (LoRaWAN) will leave...Show More
While various covert botnets were proposed in the past, they still lack complete anonymization for their servers/botmasters or suffer from slow communication between the botmaster and the bots. In this article, we first propose a new generation hybrid botnet that covertly and efficiently communicates over Bitcoin Lightning Network (LN), called LNBot. Exploiting various anonymity features of LN, we...Show More
Modern Medical Devices (MMDs) are a rapidly growing field of medical technology, and recent advances have allowed them to monitor and manage patients’ health remotely. As these devices become more connected in order to enhance the delivery of patient care, the concerns surrounding security, privacy, and safety are also increasing. To effectively address these concerns, "shift-left security"-which ...Show More
As Smart Grid comes with new smart devices and additional data collection for improved control decisions, this puts a lot of burden on the underlying legacy communication infrastructures that may be severely limited in bandwidth. Therefore, an alternative is to consider publish-subscribe architectures for not only enabling flexible communication options but also exploiting multicasting capabilitie...Show More
As 5G systems are starting to be deployed and becoming part of many daily life applications, there is an increasing interest on the security of the overall system as 5G network architecture is significantly different than LTE systems. For instance, through application specific virtual network slices, one can trigger additional security measures depending on the sensitivity of the running applicati...Show More
DNP3 is one of the oldest and widely used communication protocols for smart power grid, which has been upgraded to DNP3 Secure Authentication (SA) to address the increasing security needs of power grid applications. However, in practice, such upgrade was only deployed for critical operations due to its major overhead while non-critical operations are still not protected. Nevertheless, with the ong...Show More
IoT devices have been adopted widely in the last decade which enabled collection of various data from different environments. Data storage poses challenges since the data may be compromised during the storage and the integrity might be violated without being noticed. In such cases, integrity and data provenance are required in order to be able to detect the source of any incident and prove it in l...Show More
With the increasing interest in connected vehicles along with electrification opportunities, there is an ongoing effort to automate the charging process of electric vehicles (EVs) through their capabilities to communicate with the infrastructure and each other. However, charging EVs takes time and thus in-advance scheduling is needed. As this process is done frequently due to limited mileage per c...Show More
Blockchain technology has drawn attention from various communities. The underlying consensus mechanism in Blockchain enables a myriad of applications for the integrity assurance of stored data. In this paper, we utilize Blockchain technology to verify the authenticity of a video captured by a streaming IoT device for forensic investigation purposes. The proposed approach computes the hash of video...Show More
With the increasing digitization of different components of Smart Grid, there is an ongoing effort to design secure protocols and deploy them for different applications. A major need along with these efforts is to deal with key management for a large number of devices which are resource constrained and deployed within a very legacy communication environment. As the utilities rightly request to bui...Show More
With the increasing interest in connected vehicles along with electrification opportunities, there is an ongoing effort to automate the charging process of electric vehicles (EVs). However, charging EVs takes time and thus in-advance scheduling is needed. This, however, raises privacy concerns since frequent scheduling will expose the charging pattern of the EV to the service providers. Neverthele...Show More
While Bitcoin dominates the market for cryptocurrencies, its use in micropayments is still a challenge due to its long transaction validation times and high fees. Recently, the concept of off-chain payments is introduced that led to the idea of establishing a payment network called Lightning Network (LN). Off-chain links provide the ability to do transactions without writing to Blockchain. However...Show More
Mass penetration and market dominance of Electric Vehicles (EVs) are expected in the upcoming years. Due to their frequent charging needs, not only public and private charging stations are being built, but also V2V charging options are considered. This forms a charging network with various suppliers and EV customers which can communicate to schedule charging operations. While an app can be designe...Show More
Today's vehicles are becoming cyber-physical systems that not only communicate with other vehicles but also gather various information from hundreds of sensors within them. These developments help create smart and connected (e.g., self-driving) vehicles that will introduce significant information to drivers, manufacturers, insurance companies, and maintenance service providers for various applicat...Show More
Advanced Metering Infrastructure (AMI) forms a communication network for the collection of power data from smart meters in Smart Grid. As the communication within an AMI needs to be secure, public-key cryptography can be used to reduce the overhead of key management. However, it still has certain challenges in terms of certificate revocation and management. In particular, distribution and storage ...Show More
Advanced Metering Infrastructure (AMI) forms a communication network for the collection of power data from smart meters in Smart Grid. As the communication within an AMI needs to be secure, key management becomes an issue due to overhead and limited resources. While using public-keys eliminate some of the overhead of key management, there is still challenges regarding certificates that store and c...Show More