Skip to main content

Showing 1–17 of 17 results for author: Dedeoglu, V

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.03918  [pdf, other

    cs.LG cs.CR

    Unlearning Backdoor Attacks through Gradient-Based Model Pruning

    Authors: Kealan Dunnett, Reza Arablouei, Dimity Miller, Volkan Dedeoglu, Raja Jurdak

    Abstract: In the era of increasing concerns over cybersecurity threats, defending against backdoor attacks is paramount in ensuring the integrity and reliability of machine learning models. However, many existing approaches require substantial amounts of data for effective mitigation, posing significant challenges in practical deployment. To address this, we propose a novel approach to counter backdoor atta… ▽ More

    Submitted 6 May, 2024; originally announced May 2024.

  2. arXiv:2401.00659  [pdf, ps, other

    cs.DB

    Advanced Dataset Discovery: When Multi-Query-Dataset Cardinality Estimation Matters

    Authors: Tingting Wang, Shixun Huang, Zhifeng Bao, J. Shane Culpepper, Reza Arablouei, Volkan Dedeoglu

    Abstract: As available data increases, so too does the demand to dataset discovery. Existing studies often yield coarse-grained results where significant information overlaps and non-relevant data occur. They also implicitly assume that a user can purchase all datasets found, which is rarely true in practice. Therefore, achieving dataset discovery results with less redundancy using fine-grained information… ▽ More

    Submitted 31 December, 2023; originally announced January 2024.

  3. arXiv:2308.11638  [pdf, other

    eess.SP cs.AI cs.LG

    IoT Data Trust Evaluation via Machine Learning

    Authors: Timothy Tadj, Reza Arablouei, Volkan Dedeoglu

    Abstract: Various approaches based on supervised or unsupervised machine learning (ML) have been proposed for evaluating IoT data trust. However, assessing their real-world efficacy is hard mainly due to the lack of related publicly-available datasets that can be used for benchmarking. Since obtaining such datasets is challenging, we propose a data synthesis method, called random walk infilling (RWI), to au… ▽ More

    Submitted 15 August, 2023; originally announced August 2023.

  4. arXiv:2212.04658  [pdf, other

    cs.CR cs.NI

    Trust and Reputation Management for Blockchain-enabled IoT

    Authors: Guntur Dharma Putra, Sidra Malik, Volkan Dedeoglu, Salil S Kanhere, Raja Jurdak

    Abstract: In recent years, there has been an increasing interest in incorporating blockchain for the Internet of Things (IoT) to address the inherent issues of IoT, such as single point of failure and data silos. However, blockchain alone cannot ascertain the authenticity and veracity of the data coming from IoT devices. The append-only nature of blockchain exacerbates this issue, as it would not be possibl… ▽ More

    Submitted 8 December, 2022; originally announced December 2022.

    Comments: COMSNETS 2023 Invited Paper

  5. arXiv:2208.07562  [pdf, other

    cs.NI

    Towards Blockchain-based Trust and Reputation Management for Trustworthy 6G Networks

    Authors: Guntur Dharma Putra, Volkan Dedeoglu, Salil S Kanhere, Raja Jurdak

    Abstract: 6G is envisioned to enable futuristic technologies, which exhibit more complexities than the previous generations, as it aims to bring connectivity to a large number of devices, many of which may not be trustworthy. Proper authentication can protect the network from unauthorized adversaries. However, it cannot guarantee in situ reliability and trustworthiness of authorized network nodes, as they c… ▽ More

    Submitted 16 August, 2022; originally announced August 2022.

    Comments: Accepted for publication in the IEEE Network Magazine

  6. Decentralised Trustworthy Collaborative Intrusion Detection System for IoT

    Authors: Guntur Dharma Putra, Volkan Dedeoglu, Abhinav Pathak, Salil S. Kanhere, Raja Jurdak

    Abstract: Intrusion Detection Systems (IDS) have been the industry standard for securing IoT networks against known attacks. To increase the capability of an IDS, researchers proposed the concept of blockchain-based Collaborative-IDS (CIDS), wherein blockchain acts as a decentralised platform allowing collaboration between CIDS nodes to share intrusion related information, such as intrusion alarms and detec… ▽ More

    Submitted 21 October, 2021; originally announced October 2021.

    Comments: 8 pages, 7 figures, accepted to IEEE Blockchain 2021

  7. arXiv:2109.07721  [pdf, other

    cs.CR cs.DC

    Blockchain for Trust and Reputation Management in Cyber-physical Systems

    Authors: Guntur Dharma Putra, Volkan Dedeoglu, Salil S Kanhere, Raja Jurdak

    Abstract: The salient features of blockchain, such as decentralisation and transparency, have allowed the development of Decentralised Trust and Reputation Management Systems (DTRMS), which mainly aim to quantitatively assess the trustworthiness of the network participants and help to protect the network from adversaries. In the literature, proposals of DTRMS have been applied to various Cyber-physical Syst… ▽ More

    Submitted 16 September, 2021; originally announced September 2021.

    Comments: 17 pages, 4 figures

  8. arXiv:2108.12032  [pdf, other

    cs.CR

    Blockchain in Supply Chain: Opportunities and Design Considerations

    Authors: Gowri Sankar Ramachandran, Sidra Malik, Shantanu Pal, Ali Dorri, Volkan Dedeoglu, Salil Kanhere, Raja Jurdak

    Abstract: Supply chain applications operate in a multi-stakeholder setting, demanding trust, provenance, and transparency. Blockchain technology provides mechanisms to establish a decentralized infrastructure involving multiple stakeholders. Such mechanisms make the blockchain technology ideal for multi-stakeholder supply chain applications. This chapter introduces the characteristics and requirements of th… ▽ More

    Submitted 26 August, 2021; originally announced August 2021.

  9. arXiv:2105.11217  [pdf, other

    cs.CR

    TradeChain: Decoupling Traceability and Identity inBlockchain enabled Supply Chains

    Authors: Sidra Malik, Naman Gupta, Volkan Dedeoglu, Salil S. Kanhere, Raja Jurdak

    Abstract: In this work, we propose a privacy-preservation framework, TradeChain, which decouples the trade events of participants using decentralised identities. TradeChain adopts the Self-Sovereign Identity (SSI) principles and makes the following novel contributions: a) it incorporates two separate ledgers: a public permissioned blockchain for maintaining identities and the permissioned blockchain for rec… ▽ More

    Submitted 24 May, 2021; originally announced May 2021.

  10. arXiv:2104.13964  [pdf, other

    cs.CR

    PrivChain: Provenance and Privacy Preservation in Blockchain enabled Supply Chains

    Authors: Sidra Malik, Volkan Dedeoglu, Salil Kanhere, Raja Jurdak

    Abstract: Blockchain offers traceability and transparency to supply chain event data and hence can help overcome many challenges in supply chain management such as: data integrity, provenance and traceability. However, data privacy concerns such as the protection of trade secrets have hindered adoption of blockchain technology. Although consortium blockchains only allow authorised supply chain entities to r… ▽ More

    Submitted 27 April, 2021; originally announced April 2021.

  11. arXiv:2104.00832  [pdf, other

    cs.CR

    Trust-based Blockchain Authorization for IoT

    Authors: Guntur Dharma Putra, Volkan Dedeoglu, Salil S Kanhere, Raja Jurdak, Aleksandar Ignjatovic

    Abstract: Authorization or access control limits the actions a user may perform on a computer system, based on predetermined access control policies, thus preventing access by illegitimate actors. Access control for the Internet of Things (IoT) should be tailored to take inherent IoT network scale and device resource constraints into consideration. However, common authorization systems in IoT employ convent… ▽ More

    Submitted 1 April, 2021; originally announced April 2021.

    Comments: 12 pages, 10 figures, submitted to IEEE Transactions on Network and Service Management

  12. arXiv:2002.07512  [pdf, other

    cs.CR cs.DC

    Poster Abstract: Towards Scalable and Trustworthy Decentralized Collaborative Intrusion Detection System for IoT

    Authors: Guntur Dharma Putra, Volkan Dedeoglu, Salil S Kanhere, Raja Jurdak

    Abstract: An Intrusion Detection System (IDS) aims to alert users of incoming attacks by deploying a detector that monitors network traffic continuously. As an effort to increase detection capabilities, a set of independent IDS detectors typically work collaboratively to build intelligence of holistic network representation, which is referred to as Collaborative Intrusion Detection System (CIDS). However, d… ▽ More

    Submitted 18 February, 2020; originally announced February 2020.

    Comments: Accepted to ACM/IEEE IoTDI 2020

  13. Energy-aware Demand Selection and Allocation for Real-time IoT Data Trading

    Authors: Pooja Gupta, Volkan Dedeoglu, Kamran Najeebullah, Salil S. Kanhere, Raja Jurdak

    Abstract: Personal IoT data is a new economic asset that individuals can trade to generate revenue on the emerging data marketplaces. Typically, marketplaces are centralized systems that raise concerns of privacy, single point of failure, little transparency and involve trusted intermediaries to be fair. Furthermore, the battery-operated IoT devices limit the amount of IoT data to be traded in real-time tha… ▽ More

    Submitted 10 July, 2020; v1 submitted 5 February, 2020; originally announced February 2020.

    Comments: Accepted in SmartComp 2020

  14. arXiv:1912.10247  [pdf, other

    cs.CR cs.NI

    Trust Management in Decentralized IoT Access Control System

    Authors: Guntur Dharma Putra, Volkan Dedeoglu, Salil S. Kanhere, Raja Jurdak

    Abstract: Heterogeneous and dynamic IoT environments require a lightweight, scalable, and trustworthy access control system for protection from unauthorized access and for automated detection of compromised nodes. Recent proposals in IoT access control systems have incorporated blockchain to overcome inherent issues in conventional access control schemes. However, the dynamic interaction of IoT networks rem… ▽ More

    Submitted 9 March, 2020; v1 submitted 21 December, 2019; originally announced December 2019.

    Comments: Accepted to IEEE ICBC 2020

  15. arXiv:1912.01606  [pdf, other

    cs.CR

    A journey in applying blockchain for cyberphysical systems

    Authors: Volkan Dedeoglu, Ali Dorri, Raja Jurdak, Regio A. Michelin, Roben C. Lunardi, Salil S. Kanhere, Avelino F. Zorzo

    Abstract: Cyberphysical Systems (CPS) are transforming the way we interact with the physical world around us. However, centralised approaches for CPS systems are not capable of addressing the unique challenges of CPS due to the complexity, constraints, and dynamic nature of the interactions. To realize the true potential of CPS, a decentralized approach that takes into account these unique features is requi… ▽ More

    Submitted 3 December, 2019; originally announced December 2019.

    Comments: COMSNET 2020

  16. arXiv:1906.11461  [pdf, other

    cs.CR cs.DC

    A Trust Architecture for Blockchain in IoT

    Authors: Volkan Dedeoglu, Raja Jurdak, Guntur D. Putra, Ali Dorri, Salil S. Kanhere

    Abstract: Blockchain is a promising technology for establishing trust in IoT networks, where network nodes do not necessarily trust each other. Cryptographic hash links and distributed consensus mechanisms ensure that the data stored on an immutable blockchain can not be altered or deleted. However, blockchain mechanisms do not guarantee the trustworthiness of data at the origin. We propose a layered archit… ▽ More

    Submitted 27 June, 2019; originally announced June 2019.

    Comments: Submitted to MobiQuitous2019

  17. arXiv:1906.01831  [pdf, other

    cs.CR

    TrustChain: Trust Management in Blockchain and IoT supported Supply Chains

    Authors: Sidra Malik, Volkan Dedeoglu, Salil S. Kanhere, Raja Jurdak

    Abstract: Traceability and integrity are major challenges for the increasingly complex supply chains of today's world. Although blockchain technology has the potential to address these challenges through providing a tamper-proof audit trail of supply chain events and data associated with a product life-cycle, it does not solve the trust problem associated with the data itself. Reputation systems are an effe… ▽ More

    Submitted 5 June, 2019; originally announced June 2019.

    Comments: 10 pages, IEEE Blockchain 2019 conference paper (accepted)