Skip to main content

Showing 1–8 of 8 results for author: Ozmen, M O

Searching in archive cs. Search in all archives.
.
  1. arXiv:2105.00645  [pdf, other

    cs.CR

    On the Safety Implications of Misordered Events and Commands in IoT Systems

    Authors: Furkan Goksel, Muslum Ozgur Ozmen, Michael Reeves, Basavesh Shivakumar, Z. Berkay Celik

    Abstract: IoT devices, equipped with embedded actuators and sensors, provide custom automation in the form of IoT apps. IoT apps subscribe to events and upon receipt, transmit actuation commands which trigger a set of actuators. Events and actuation commands follow paths in the IoT ecosystem such as sensor-to-edge, edge-to-cloud, and cloud-to-actuator, with different network and processing delays between th… ▽ More

    Submitted 3 May, 2021; originally announced May 2021.

  2. arXiv:2103.09345  [pdf, other

    cs.CR

    Compatible Certificateless and Identity-Based Cryptosystems for Heterogeneous IoT

    Authors: Rouzbeh Behnia, Attila A. Yavuz, Muslum Ozgur Ozmen, Tsz Hon Yuen

    Abstract: Certificates ensure the authenticity of users' public keys, however their overhead (e.g., certificate chains) might be too costly for some IoT systems like aerial drones. Certificate-free cryptosystems, like identity-based and certificateless systems, lift the burden of certificates and could be a suitable alternative for such IoTs. However, despite their merits, there is a research gap in achievi… ▽ More

    Submitted 16 March, 2021; originally announced March 2021.

    Journal ref: In International Conference on Information Security (pp. 39-58). Springer, Cham (2020)

  3. Discovering IoT Physical Channel Vulnerabilities

    Authors: Muslum Ozgur Ozmen, Xuansong Li, Andrew Chu, Z. Berkay Celik, Bardh Hoxha, Xiangyu Zhang

    Abstract: Smart homes contain diverse sensors and actuators controlled by IoT apps that provide custom automation. Prior works showed that an adversary could exploit physical interaction vulnerabilities among apps and put the users and environment at risk, e.g., to break into a house, an adversary turns on the heater to trigger an app that opens windows when the temperature exceeds a threshold. Currently, t… ▽ More

    Submitted 7 September, 2022; v1 submitted 2 February, 2021; originally announced February 2021.

    Comments: Published in ACM CCS 2022

  4. arXiv:1907.03911  [pdf, other

    cs.CR

    Ultra Lightweight Multiple-time Digital Signature for the Internet of Things Devices

    Authors: Attila A. Yavuz, Muslum Ozgur Ozmen

    Abstract: Digital signatures are basic cryptographic tools to provide authentication and integrity in the emerging ubiquitous systems in which resource-constrained devices are expected to operate securely and efficiently. However, existing digital signatures might not be fully practical for such resource-constrained devices (e.g., medical implants) that have energy limitations. Some other computationally ef… ▽ More

    Submitted 8 July, 2019; originally announced July 2019.

    Comments: Published in IEEE Transactions on Services Computing (IEEE TSC)

  5. arXiv:1904.06829  [pdf, other

    cs.CR cs.CY

    IoD-Crypt: A Lightweight Cryptographic Framework for Internet of Drones

    Authors: Muslum Ozgur Ozmen, Rouzbeh Behnia, Attila A. Yavuz

    Abstract: Internet of Drones (IoD) is expected to play a central role in many civilian and military applications, that require sensitive and mission-critical information to be processed. It is therefore vital to ensure the security and privacy of IoD. However, unlike traditional networks, IoD has a broader attack surface and is highly energy-constrained, which hinder the direct adoption of standard cryptogr… ▽ More

    Submitted 14 April, 2019; originally announced April 2019.

  6. Dronecrypt - An Efficient Cryptographic Framework for Small Aerial Drones

    Authors: Muslum Ozgur Ozmen, Attila A. Yavuz

    Abstract: Aerial drones are becoming an integral part of application domains including but not limited to, military operations, package delivery, construction, monitoring and search/rescue operations. It is critical to ensure the cyber security of networked aerial drone systems in these applications. Standard cryptographic services can be deployed to provide basic security services; however, they have been… ▽ More

    Submitted 28 March, 2019; originally announced March 2019.

    Comments: Published in IEEE Milcom 2018

  7. arXiv:1903.07786  [pdf, other

    cs.CR

    Energy-Aware Digital Signatures for Embedded Medical Devices

    Authors: Muslum Ozgur Ozmen, Attila A. Yavuz, Rouzbeh Behnia

    Abstract: Authentication is vital for the Internet of Things (IoT) applications involving sensitive data (e.g., medical and financial systems). Digital signatures offer scalable authentication with non-repudiation and public verifiability, which are necessary for auditing and dispute resolution in such IoT applications. However, digital signatures have been shown to be highly costly for low-end IoT devices,… ▽ More

    Submitted 18 March, 2019; originally announced March 2019.

    Comments: Original Publication in IEEE CNS 2019

  8. arXiv:1903.02142  [pdf, other

    cs.CR

    ARIS: Authentication for Real-Time IoT Systems

    Authors: Rouzbeh Behnia, Muslum Ozgur Ozmen, Attila A. Yavuz

    Abstract: Efficient authentication is vital for IoT applications with stringent minimum-delay requirements (e.g., energy delivery systems). This requirement becomes even more crucial when the IoT devices are battery-powered, like small aerial drones, and the efficiency of authentication directly translates to more operation time. Although some fast authentication techniques have been proposed, some of them… ▽ More

    Submitted 8 April, 2020; v1 submitted 5 March, 2019; originally announced March 2019.