Ahmet Onur Durahim

Learn More
In this paper, we propose a framework, named as A-MAKE, which efficiently provides security, privacy, and accountability for communications in wireless mesh networks. More specifically, the framework provides an anonymous mutual authentication protocol whereby legitimate users can connect to network from anywhere without being identified or tracked. No(More)
Article history: Received 4 September 2014 Received in revised form 24 June 2015 Accepted 28 June 2015 Available online 9 July 2015 The prominence of social media has contributed to open information access for the researchers. With voluntary information sharing structure of Twitter, user disposition and sentiment analyses can be performed for determining(More)
We present a lightweight authentication mechanism which verifies the authenticity of code and thereby addresses the virus and malicious code problems at the hardware level eliminating the need for trusted extensions in the operating system. The technique we propose tightly integrates the authentication mechanism into the processor core. The authentication(More)
We design and realize a protected zone inside a reconfigurable and extensible embedded RISC processor for isolated execution of cryptographic algorithms. The protected zone is a collection of processor subsystems such as functional units optimized for high-speed execution of integer operations, a small amount of local memory, and general- and(More)
In recent years wireless mesh networking has emerged as a promising technology to tackle the challenges of the next era of broadband services. It has offered the economical services in the field of medicine, defense, natural disasters and availability of Internet access in the remote areas etc. In this review paper, the fundamental security challenges and(More)
Wireless sensor networks have been analyzed for more than a decade from operational and security points of view. Several key predistribution schemes have been proposed in the literature. Although valuable and state-of-the-art proposals have been made, their corresponding security analyses have not been performed by considering the dynamic nature of(More)
Wireless Mesh Networks (WMNs) have emerged as a promising technology to provide low cost and scalable solutions for high speed Internet access and additional services. In hybrid WMNs, where mesh clients also act as relaying agents and form a mesh client network, it is important to provide users with an efficient anonymous and accountable authentication(More)
  • 1