Processing math: 0%
Suat Mercan - IEEE Xplore Author Profile

Showing 1-15 of 15 results

Results

Bitcoin has emerged as a revolutionary payment system with its decentralized ledger concept; however it has significant problems such as high transaction fees and low throughput. Lightning Network (LN), which was introduced much later, solves most of these problems with an innovative concept called off-chain payments. With this advancement, Bitcoin has become an attractive venue to perform micro-p...Show More
The successful amalgamation of cryptocurrency and consumer Internet-of-Things (IoT) devices can pave the way for novel applications in machine-to-machine economy. However, the lack of scalability and heavy resource requirements of initial blockchain designs hinder the integration, and it is unclear how consumer devices will be adopting cryptocurrency. Therefore, in this article, we critically revi...Show More
With the recent developments of communication technologies surrounding vehicles, we will be witnessing the simultaneous availability of multiple on-board communication interfaces on vehicles. While most of the current interfaces already include Bluetooth, WiFi, and LTE, they will be augmented further by IEEE 802.11p and the 5G interfaces, which will serve for safety, maintenance, and infotainment ...Show More
As Smart Grid comes with new smart devices and additional data collection for improved control decisions, this puts a lot of burden on the underlying legacy communication infrastructures that may be severely limited in bandwidth. Therefore, an alternative is to consider publish-subscribe architectures for not only enabling flexible communication options but also exploiting multicasting capabilitie...Show More
With the increased development and reliance on multimedia data, the importance of attributing the device or camera of origin in the form of source camera identification (SCI) has gained traction in cybersecurity, specifically within digital multimedia forensics. Photo-Response Non-Uniformity (PRNU) is a popular and widely used method for extracting a unique and reliable sensor pattern fingerprint ...Show More
The Internet of Things (IoT) has been on the rise in the last decade as it finds applications in various domains. Hospitality is one of the pioneer sectors that has adopted this technology to create novel services such as smart hotel rooms, personalized services etc. Hotels, restaurants, theme parks, and cruise ships are some specific application areas to improve customer satisfaction by creating ...Show More
Unmanned Aerial Vehicles (UAVs) also known as drones are being used in many applications where they can record or stream videos. One interesting application is the Intelligent Transportation Systems (ITS) and public safety applications where drones record videos and send them to a control center for further analysis. These videos are shared by various clients such as law enforcement or emergency p...Show More
IoT devices have been adopted widely in the last decade which enabled collection of various data from different environments. Data storage poses challenges since the data may be compromised during the storage and the integrity might be violated without being noticed. In such cases, integrity and data provenance are required in order to be able to detect the source of any incident and prove it in l...Show More
The last decade has experienced a vast interest in Blockchain-based cryptocurrencies. However, slow confirmation times of transactions hamper their wide adoption for micropayments. The idea of establishing payment channel networks is one of the many proposed solutions to address this scalability. Due to the way these channels are created, both sides have a certain one-way capacity for making trans...Show More
Blockchain-based cryptocurrencies received a lot of attention recently for their applications in many domains. IoT domain is one of such applications, which can utilize cryptocurrencies for micropayments without compromising their payment privacy. However, long confirmation times of transactions and relatively high fees hinder the adoption of cryptoccurency based micro-payments. The payment channe...Show More
Blockchain technology has drawn attention from various communities. The underlying consensus mechanism in Blockchain enables a myriad of applications for the integrity assurance of stored data. In this paper, we utilize Blockchain technology to verify the authenticity of a video captured by a streaming IoT device for forensic investigation purposes. The proposed approach computes the hash of video...Show More
Delay is a crucial factor on the Internet especially for real-time applications like video or audio. The best-effort service model doesn't provide essential assistance to these applications because of the unstable queuing delays. In this work, we present the result of a measurement study designed to understand packet delay time and variation on the Internet. Measurements are performed between some...Show More
Delay is a crucial factor on the Internet especially for real-time multimedia and interactive applications like videoconferencing, gaming. The best-effort service model doesn't provide essential assistance to these applications because of the unstable queuing delays. Cloud infrastructures have being used heavily for content delivery by replicating the original content prior to demand. In this work...Show More
Overlay multicasting enabled many new overlay and peer-to-peer applications such as P2PTV, large-scale content sharing, and live video streaming. Sensitivity of these applications differs against various network performance metrics such as delay, loss, or bandwidth. We propose a generalized method of calculating overlay trees to increase user-perceived quality of performance-sensitive applications...Show More
In this paper we propose Virtual Direction Multicast (VDM) which aims to minimize network usage and disconnection time for video multicast applications on peer-to-peer overlay networks. It locates the end hosts relative to each other based on a virtualized orientation scheme. It builds multicast tree by connecting the nodes which are estimated to be in the same virtual direction. By using the conc...Show More