Enes Erdin, Mumin Cebe, Kemal Akkaya, Senay Solak, Eyuphan Bulut, Selcuk Uluagac
Building a Private Bitcoin-Based Payment Network Among Electric Vehicles and Charging Stations Conference Paper
In the Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), 2018.
Abstract | Links | BibTeX | Tags: Blockchain Security, Vehicle security
@conference{Erdin2018PrivBCNetc,
title = {Building a Private Bitcoin-Based Payment Network Among Electric Vehicles and Charging Stations},
author = {Enes Erdin and Mumin Cebe and Kemal Akkaya and Senay Solak and Eyuphan Bulut and Selcuk Uluagac},
url = {https://ieeexplore.ieee.org/abstract/document/8726825},
year = {2018},
date = {2018-01-01},
urldate = {2018-01-01},
publisher = {In the Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)},
abstract = {Mass penetration and market dominance of Electric Vehicles (EVs) are expected in the upcoming years. Due to their frequent charging needs, not only public and private charging stations are being built, but also V2V charging options are considered. This forms a charging network with various suppliers and EV customers which can communicate to schedule charging operations. While an app can be designed to develop matching algorithms for charging schedules, the system also needs a convenient payment method that will enable privacy-preserving transactions among the suppliers and EVs. In this paper, we adopt a Bitcoin-based payment system for the EV charging network payments. However, Bitcoin has a transaction fee which would be comparable to the price of the charging service most of the time and thus may not be attractive to users. High transaction fees can be eliminated by building a payment network in parallel to main ledger, with permission and signatures. In this paper, we design and implement such a network among charging stations and mobile EVs with flow, connectivity and fairness constraints, and demonstrate results for the feasibility of the scheme under different circumstances. More specifically, we propose a payment network optimization model for determining payment channels among charging stations. We present numerical results on the characteristics of the network model by using realistic use cases.},
keywords = {Blockchain Security, Vehicle security},
pubstate = {published},
tppubtype = {conference}
}
Abbas Acar, Hidayet Aksu, A. Selcuk Uluagac, Kemal Akkaya
WACA: Wearable-Assisted Continuous Authentication Conference Paper
In the Proceedings of the IEEE Security and Privacy Workshops (SPW) , 2018.
Abstract | Links | BibTeX | Tags: Authentication, Vehicle security
@conference{Acar2018WACAb,
title = {WACA: Wearable-Assisted Continuous Authentication},
author = {Abbas Acar and Hidayet Aksu and A. Selcuk Uluagac and Kemal Akkaya},
url = {https://ieeexplore.ieee.org/abstract/document/8424658},
year = {2018},
date = {2018-01-01},
urldate = {2018-01-01},
publisher = {In the Proceedings of the IEEE Security and Privacy Workshops (SPW) },
abstract = {One-time login process in conventional authentication systems does not guarantee that the identified user is the actual user throughout the session. However, it is necessary to re-verify the user identity periodically throughout a login session, which is lacking in existing one-time login systems. In this paper, we introduce a usable and reliable Wearable-Assisted Continuous Authentication (WACA), which relies on the sensor-based keystroke dynamics and the authentication data is acquired through the built-in sensors of a wearable (e.g., smartwatch) while the user is typing. The acquired data is periodically and transparently compared with the registered profile of the initially logged-in user with one-way classifiers. With this, WACA continuously ensures that the current user is the user who logged in initially. We implemented the WACA framework and evaluated its performance on real devices with real users. The empirical evaluation of WACA reveals that WACA is feasible and its error rate is as low as 1% with 30 seconds of processing time and 2 - 3% for 20 seconds. The computational overhead is minimal. Furthermore, WACA is capable of identifying insider threats with very high accuracy (99.2%).},
keywords = {Authentication, Vehicle security},
pubstate = {published},
tppubtype = {conference}
}
Jinyoun Cho, A. Selcuk Uluagac, John Copeland, Yusun Chang
Efficient safety message forwarding using multi-channels in low density VANETs Conference Paper
In the proceedings of the IEEE Global Communications Conference (GLOBECOM), 2014.
Abstract | Links | BibTeX | Tags: Vehicle security, Wireless Security
@conference{ChoEfficientIEEE2014,
title = {Efficient safety message forwarding using multi-channels in low density VANETs},
author = {Jinyoun Cho and A. Selcuk Uluagac and John Copeland and Yusun Chang},
url = {https://ieeexplore.ieee.org/abstract/document/7036786/},
year = {2014},
date = {2014-01-01},
urldate = {2014-01-01},
booktitle = {In the proceedings of the IEEE Global Communications Conference (GLOBECOM)},
abstract = {Vehicular Ad-hoc networks (VANETs) provide a way for a vehicle to deliver various types of information to users or drivers in other vehicles. Distributing a large amount of information such as multimedia messages in a single control channel makes the control channel easily congested. Transmitting multimedia messages through multi-channel to avoid this congestion becomes a feasible solution. However, low-connectivity in a low vehicle density in multi-channel poses unique challenges and can produce connection failure if this issue is not carefully addressed. In this paper, a network coding technique with divide-and-deliver is introduced to solve this unique challenge for delivering multimedia contents through multiple service channels in a low vehicle density. Through the rigorous analytical derivation and extensive simulation, we show the proposed scheme significantly improves reliability with minimum usage of the control channels in a typical VANETs environment.},
keywords = {Vehicle security, Wireless Security},
pubstate = {published},
tppubtype = {conference}
}
Citations: 8413
h-index: 44
i10-index: 107