Biography
I am a computer scientist, specialized in modelling and analysis of IT systems. I also have a keen interest and academic experience in the security of systems and software.
My research is in the area of formal methods...
Industry Expertise (3)
Computer Software
Research
Computer/Network Security
Areas of Expertise (3)
Security
Verification
Sensors
Accomplishments (6)
Scholarships (professional)
Scholarships: - Erasmus Student Exchange Programme (2006). - DTU Ph.D. Programme (2007).
Invited Speaker (professional)
Invited Speaker: - Oxford University (2008), - Imperial College London (2008), - Alexandra Institute (2008), - East China Normal University (2011), - European ZigBee Developers Conference (2012).
Invited Participant (professional)
Invited Participant: Dagstuhl Seminar “Quantitative and Qualitative Analysis of Network Protocols” (2010).
Award Nomination (professional)
Award Nomination: Nominated to the Best Ph.D. Thesis award of the European Research Consortium for Informatics and Mathematics (2012).
Delegate of Denmark (professional)
Delegate of Denmark: The European Council for Doctoral Candidates and Junior Researchers (2009-2011).
Vice Chairman (professional)
Vice Chairman: Ph.D. Association, Technical University of Denmark (2009).
Education (3)
Technical University of Denmark: PhD, Computer Science 2011
Thesis title: Qualitative and Quantitative Security Analyses for ZigBee Wireless Sensor Networks
Istanbul Technical University: MSc., Computer Engineering 2007
Thesis title: Analysis of the PKMv2 Protocol in IEEE 802.16e-2005 Using Static Analysis
Istanbul Technical University: BSc., Computer Engineering 2003
Thesis title: Virtual Private Network Design and Implementation
Affiliations (2)
- Technical University of Denmark
- Istanbul Technical University
Links (2)
Event Appearances (22)
Smart Grid Security: A Smart Meter-Centric Perspective
2nd General Meeting of the IDEA4CPS Project Shanghai, China
2012-11-21
Key Update Assistant for Resource-Constrained Networks
The 17th IEEE Symposium on Computers and Communications Cappadocia, Turkey
2012-07-01
Modelling and Analysis of Smart Grid: A Stochastic Model Checking Case Study
The 6th IEEE International Symposium on Theoretical Aspects of Software Engineering Beijing, China
2012-07-05
Resilience Analysis of Key Update Strategies for Resource-Constrained Networks
The 3rd International Congress on Ultra Modern Telecommunications and Control Systems Budapest, Hungary
2011-10-06
Characteristics of Key Update Strategies for Wireless Sensor Networks
International Conference on Network Communication and Computer New Delhi, India
2011-03-22
Optimizing Key Updates in Sensor Networks
IEEE Sensors Applications Symposium San Antonio, Texas, USA
2011-02-22
A Secure Key Establishment Protocol for ZigBee Wireless Sensor Networks
The 24th International Symposium on Computer and Information Sciences Cyprus
2009-09-14
LBTool: A Stochastic Toolkit for Leave-Based Key Updates
The 4th IEEE International Workshop on Performance Evaluation of Communications in Distributed Systems and Web based Service Architectures Cyprus
2012-06-30
Quantitative Security Analysis of ZigBee Key Updates
The 21st Nordic Workshop on Programming Theory Copenhagen, Denmark
2009-10-13
ZigBee-2007 Security Essentials
The 13rd Nordic Workshop on Secure IT-systems Copenhagen, Denmark
2008-10-08
A Secure Simplification of the PKMv2 Protocol in IEEE 802.16e-2005
Joint Workshop on Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis Wroclaw, Poland
2007-07-07
Telsiz Yerel Alan Ağlarında Güvenlik Sorunu
Ağ ve Bilgi Güvenliği Ulusal Sempozyumu Istanbul, Turkey
2005-06-08
Sanal Özel Ağ Gerçeklemesi
Ağ ve Bilgi Güvenliği Ulusal Sempozyumu Istanbul, Turkey
2005-06-09
Küresel Ekonomide Şirketlerin Modern Fikri Mülkiyet Stratejisi Ve Sayısal Mülkiyet Hakkının Korunması
Ağ ve Bilgi Güvenliği Ulusal Sempozyumu Istanbul, Turkey
2005-06-09
A Secure Key Establishment Protocol for ZigBee Wireless Sensor Networks
Dagstuhl seminar Quantitative and Qualitative Analysis of Network Protocol Schloss Dagstuhl - Leibniz Zentrum für Informatik, Germany
2010-01-31
Time Management
LBT GRUS Denmark
2013-01-14
Static Analysis of Cryptographic Protocols: An Application in ZigBee Wireless Network Security
Seminar, University of Oxford Oxford, UK
2008-09-09
A Secure Simplification of the PKMv2 Protocol in IEEE 802.16e-2005
Seminar, Imperial College London London, UK
2008-09-14
Modelling and Verification of ZigBee Security Sublayer
Modelling and verification of security protocols, KomIalt, Alexandra Instituttet Copenhagen, Denmark
2008-12-14
Timing and research
PhD External Research Stay Event, DTU PhD Association Copenhagen, Denmark
2011-06-28
Strategies for Key Updates in ZigBee: A quantitative approach to security
6th European ZigBee Developers' Conference Munich, Germany
2012-06-26
Life after PhD
Post-PhD Career Event, DTU PhD Association Copenhagen, Denmark
2013-02-05
Sample Talks (1)
Strategies for Key Updates in ZigBee: A quantitative approach to security
ZigBee offers the advantages of simple and low-resource communication. Nevertheless, security is of particular importance in many cases such as when sensitive data is communicated or tamper-resistance is required. Updating the security keys is one of the critical points in security, which restrict the amount of data that may be exposed when a key is compromised. In this talk, we focus on methods for key update and determining optimal key update strategies for custom network scenarios. We take...
Style
Availability
- Keynote
- Moderator
- Panelist
- Workshop Leader
- Host/MC
- Author Appearance
Social