Gürkan Gür

Gürkan Gür
ZHAW Zurich University of Applied Sciences | ZHAW · Institute of Applied Information Technology (InIT)

PhD

About

117
Publications
48,234
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,168
Citations

Publications

Publications (117)
Article
Emerging cloud-centric networks span from edge clouds to large-scale datacenters with shared infrastructure among multiple tenants and applications with high availability, isolation, fault tolerance, security, and energy efficiency demands. Live migration (LiMi) plays an increasingly critical role in these environments by enabling seamless applicat...
Article
Full-text available
Software-Defined Networking stands as a pivotal technology in attaining the essential levels of flexibility and scalability demanded by pervasive and high-performance network infrastructure required for digital connected services. Nonetheless, its disaggregated and layered architecture makes it open to the time-based fingerprinting attacks. Besides...
Article
Full-text available
Microservices architecture has become an increasingly common approach for building complex software systems. With the distributed nature of microservices, multiple actors can contribute to a service, hence affecting the dynamics of the environment and making the management of liabilities and trust more challenging. Service-Level Agreements (SLAs) a...
Article
The emergence of 6G networks will pave the way for a diverse range of services to function within virtualized multi-cloud environments in the Edge-to-Cloud Continuum. This flexible and distributed architecture presents numerous prospects for enhancing service attributes such as availability, fault tolerance, and security. One primary instrument to...
Conference Paper
Full-text available
The vision and key elements of the 6th generation (6G) ecosystem are being discussed very actively in academic and industrial circles. In this work, we provide a timely update to the 6G security vision presented in our previous publications to contribute to these efforts. We elaborate further on some key security challenges for the envisioned 6G wi...
Article
Full-text available
In recent times, IoT has emerged as a new paradigm for the interconnection of heterogeneous, resource-constrained, and communication-capable smart devices. It has been anticipated as a key enabler for various domains of applications such as health care, automotive, agriculture, industrial operations, automation , energy, and the next generation of...
Article
Full-text available
Under demanding operational conditions such as traffic surges, coverage issues, and low latency requirements, terrestrial networks may become inadequate to provide the expected service levels to users and applications. Moreover, when natural disasters or physical calamities occur, the existing network infrastructure may collapse, leading to formida...
Preprint
Full-text available
The concept of the Metaverse aims to bring a fully-fledged extended reality environment to provide next generation applications and services. Development of the Metaverse is backed by many technologies, including, 5G, artificial intelligence, edge computing and extended reality. The advent of 6G is envisaged to mark a significant milestone in the d...
Article
Full-text available
While 5G is at the early deployment state around the globe, the research and industrial communities have already started concentrating their efforts on formulating the overall 6G vision comprising requirements, key enabling technologies, performance indicators, and applications. Following the trend, it is evident that 6G will emerge as highly softw...
Article
Full-text available
Multi-access Edge Computing (MEC) is a novel edge computing paradigm that moves cloud-based processing and storage capabilities closer to the mobile users by implementing server resources in the access nodes. MEC helps fulfill the stringent requirements of 5G and beyond networks to offer anytime-anywhere connectivity for many devices with ultra-low...
Article
Full-text available
The next generation of mobile networks, i.e., sixth-generation (6G), is expected by 2030, with already burgeoning research efforts towards this goal. Along with other various candidate technologies, blockchain is envisioned to enable and enhance various key functionalities of 6G networks. Accordingly, the main objective of this paper is threefold:...
Article
6G networks will take the digital services offered by 5G to a whole new level with considerably higher bit rates, lower latency, and ultra-re-liability. However, the security of these systems is crucial to fulfill the promise of 6G. A critical element of this requirement is the efficient and pervasive protection of 6G infrastructure and services. I...
Preprint
Multimedia content transmission heavily taxes network resources and puts a significant burden on wireless systems in terms of capacity and energy consumption. In this context, device-to-device (D2D) paradigm has a utilitarian value to alleviate the network burden by utilizing short-range transmissions with less energy cost. For the realization of p...
Conference Paper
Full-text available
Although the fifth generation wireless networks are yet to be fully investigated, the vision and key elements of the 6th generation (6G) ecosystem have already come into discussion. In order to contribute to these efforts and delineate the security and privacy aspects of 6G networks, we survey how security may impact the envisioned 6G wireless syst...
Technical Report
Full-text available
This white paper on AI and ML as enablers of beyond 5G (B5G) networks is based on contributions from 5G PPP projects that research, implement and validate 5G and B5G network systems. The white paper introduces the main relevant mechanisms in Artificial Intelligence (AI) and Machine Learning (ML), currently investigated and exploited for 5G and B5G...
Article
Full-text available
Although the fifth generation (5G) wireless networks are yet to be fully investigated, the visionaries of the 6th generation (6G) echo systems have already come into the discussion. Therefore, in order to consolidate and solidify the security and privacy in 6G networks, we survey how security may impact the envisioned 6G wireless systems, possible...
Article
Full-text available
Abstract Email is of critical importance as a communication channel for both business and personal matters. Unfortunately, it is also often exploited for phishing attacks. To defend against such threats, many organizations have begun to provide anti-phishing training programs to their employees. A central question in the development of such program...
Article
Full-text available
Adaptive capacity with cost-efficient resource provisioning is a crucial capability for future 6G networks. In this work, we conceptualize "expansive networks" which refers to a networking paradigm where networks should be able to extend their resource base by opportunistic but self-controlled expansive actions. To this end, we elaborate on a key a...
Article
Device-to-Device (D2D) paradigm is one of the key enablers for boosting the energy efficiency (EE) of networks. For the actualization of EE in multi-mode heterogeneous D2D networks, resource allocation should be executed accordingly. In that regard, we study resource allocation management in heterogeneous D2D networks where there is a LEO satellite...
Chapter
Dynamic group key agreement (DGKA) protocols are one of the key security primitives to secure multiparty communications in decentralized and insecure environments while considering the instant changes in a communication group. However, with the ever-increasing number of connected devices, traditional DGKA protocols have performance challenges since...
Article
Full-text available
COVID-19 pandemic caused a massive impact on healthcare, social life, and economies on a global scale. Apparently, technology has a vital role to enable ubiquitous and accessible digital health services in pandemic conditions as well as against "re-emergence" of COVID-19 disease in a post-pandemic era. Accordingly, 5G systems and 5G-enabled e-healt...
Conference Paper
Full-text available
The promise of disparate features envisioned by the 3GPP for 5G, such as offering enhanced Mobile Broadband connectivity while providing massive Machine Type Communications likely with very low data rates and maintaining Ultra Reliable Low Latency Communications requirements, create a very challenging environment for protecting the 5G networks them...
Article
Full-text available
The COVID-19 pandemic has affected the world in an unexpected manner. The human race is battling against the pandemic while schools, universities, industries, hospitals and governments are seeking new methods and technologies to seamlessly continue their usual operations. In response, this paper presents how 5G and IoT (Internet of Things) related...
Article
Full-text available
Information-Centric Networking (ICN) builds on a content-centric network architecture to overcome the shortcomings of host-centric routing/operation and realize efficient pervasive and ubiquitous networking. Similarly, Multi-access Edge Computing (MEC) is another key technology to fulfill the stringent requirements of 5G to offer anytime-anywhere c...
Article
Device-to-device (D2D) transmissions in wireless edge networks are promising for optimizing system-wide energy consumption and improving system service capacity. Cooperative content caching similarly serves efficiency goals for data-intensive applications in edge networks. In this work, we propose two cooperative cache replacement algorithms in D2D...
Conference Paper
Full-text available
The world transforms towards the intelligent information era by 2030. The key domains linked with human life such as healthcare, transport, entertainment, and smart cities are expected to elevate the quality of service with high-end user experience. Therefore, the telecommunication infrastructure has to meet unprecedented service level requirements...
Article
Next-generation wireless systems are expected to provide bandwidth-hungry services in a cost-efficient and ubiquitous manner. D2D communications, spectrum sharing and heterogeneous network architectures (HetNets) are touted as crucial enablers to attain these goals. Moreover, the shifting characteristics of network traffic towards content consumpti...
Article
One key objective of 5G is to attain massive connectivity and a 1,000× capacity increase in wireless networks to serve data-hungry applications anytime, anywhere. In that vein, the role of hybrid satellite networks in 5G systems is crucial, with core traits such as broadcast/multicast capability and ubiquitous connectivity. Another promising approa...
Article
SDN brings new opportunities to alleviate the existing security deficiencies of traditional networks. However, it also introduces new issues, a primary one being the vulnerabilities related to data and control plane communications. This work presents a security architecture to address security problems regarding data exchange in software-defined ne...
Conference Paper
Resilience in SDN control plane is a challenging goal when a single controller is employed. Thus, distributed controllers are deployed to realize a resilient and reliable software defined network. However, such a strategy can not succeed without an efficacious controller-switch assignment scheme. In addition to zero-day assignment, online re-assign...
Chapter
In a conventional network management setting, the mobile network operator (MNO) has to account for the traffic fluctuations in its service area and over-provision its network considering the peak traffic. However, this inefficient approach results in a very high cost for the MNO. Alternatively, the MNO can expand its capacity with secondary spectru...
Article
The Internet of Things (IoT) contains a diverse set of sensors, actuators and other Internet-connected devices communicating, processing data and performing a multitude of functions. It is emerging as an integral part of societal infrastructure enabling smart services. However, these connected objects might have various vulnerabilities that can lea...
Article
Software-Defined Networking (SDN) is a communication paradigm that brings cost efficiency and flexibility through software-defined functions resident on centralized controllers. Although SDN applications are introduced in a limited scope with related technologies still under development, operational SDN networks already face major security threats....
Conference Paper
Information-centric networking (ICN) is a Future Internet paradigm which uses named information (data objects) instead of host-based end-to-end communications. In-network caching is a key pillar of ICN. Basically, data objects are cached in ICN routers and retrieved from these network elements upon availability when they are requested. It is a part...
Preprint
Content-oriented operation with D2D communications and spectrum sharing in the form of cognitive communications are expected to be enablers for cost-efficient nextgeneration wireless systems with bandwidth-hungry services. To this end, caching is an important building block of these systems. In this work, we model such a heterogeneous network and m...
Article
Full-text available
5G has to fulfill the requirements of ultra-dense, scalable, and customizable networks such as IoT while increasing spectrum and energy efficiency. Given the diversity of envisaged applications and scenarios, one crucial property for 5G New Radio (NR) is flexibility: flexible UL/DL allocation, bandwidths, or scalable transmission time interval, and...
Conference Paper
Full-text available
Transmission of block-coded images through error-prone wireless channels often results in lost blocks. In this study, we investigate a novel error concealment method for covering up these high packet losses and reconstructing a close approximation. Our scheme is a modified discrete wavelet transform (DWT) technique (namely, subbands based image err...
Article
SDN is a pivotal technology that relies on the fundamental idea of decoupling control and data planes in the network. This property provides several advantages such as flexibility, simplification, and lower costs. However, it also brings several drawbacks that are largely induced by the centralized control paradigm. Security is one of the most sign...
Conference Paper
We present QoS experiments done in an advanced object store that supports the local execution of code on objects. We show how by giving different levels of resources to different objects, we are able to offer considerable improvement in the performance of the more-important objects, at the expense of the less-important objects. We created two tiers...
Article
The inefficient and inflexible utilization of radio spectrum has led to the Cognitive Radio (CR) concept where licensed bands are allowed to be used by a secondary network without harming the primary user operation. The impact of this empirical deficiency in spectral resource management has been aggravated with the exploding content consumption ove...
Article
This paper presents a comprehensive survey on filtering-based defense mechanisms against distributed denial of service (DDoS) attacks. Several filtering techniques are analyzed and their advantages and disadvantages are presented. In order to help network security analysts choose the most appropriate mechanism according to their security requiremen...
Article
This chapter presents the topic of multimedia transmission over wireless networks highlighting general challenges driving the research on wireless technologies and networking techniques for mobile multimedia support. After an overview of wireless networks and multimedia transmission characteristics, a layered analysis is provided ranging from the a...
Conference Paper
In this study, we present a lightweight context-aware security system for wireless Internet access. Our system consists of an Android mobile application and a web browser plug-in called G&ALF. Android application is used to retrieve the public configuration parameters of available wireless connections, evaluate the context and assess the security l...
Article
Information-centric networking (ICN) promises to overcome the networking challenges of the current Internet, e.g. the explosion of content consumption and the widening gap between traffic and capacity growth, by decoupling the content from the network locations. Simultaneously, the dominant mode of content access in Internet is materializing as IP-...
Article
In this paper, important aspects of the controller placement problem (CPP) in Software Defined Mobile Networks (SDMN) are discussed. To find an efficient and optimal controller placement, we must clarify how many controllers we need, where we place them in topology, and how they interact with each other. We take into consideration reliability, late...
Chapter
This chapter discusses important aspects of the controller placement problem (CPP) in software defined mobile networks (SDMN). To find an efficient and optimal controller placement, we must clarify how many controllers we need, where we place them in topology, and how they interact with each other. We take into consideration reliability, latency, r...
Chapter
The security analysis of computer networks has become a more essential but complicated topic with the proliferation of information and communications systems. In this chapter, we present a comprehensive review of security analysis of computer networks. Moreover, we discuss key concepts and methodologies utilized in this field. We identify fundament...
Article
Attack graphs are instrumental to analyze security vulnerabilities in networks. They provide decision support to security analysts via identification of critical exploitation scenarios. However, they may suffer from scalability issues due to network size and potential vulnerabilities, and become difficult to analyze. In this paper, we propose a heu...
Article
Full-text available
Mobile network traffic is expected to increase dramatically with the proliferation of smart and diverse wireless devices. Moreover, pervasive and complex services such as mobile cloud, device-to-device communications and mobile multimedia consumption will require higher bandwidth and better network coverage. Hence, more spectrum and capacity with s...
Article
Cognitive radio networks (CRNs) are envisaged to alleviate the spectrum and capacity shortage aggravated by the static spectrum allocation. They are crucial for meeting the requirements of wireless traffic explosion emerging with new wireless applications and services. However, the security of CRNs is critical for their practical usage and widespre...
Article
This volume contains the proceedings of the 2014 International Advanced Intrusion Detection and Prevention (AIDP'14) Workshop, held in Marrakesh, Morocco, on the 5th of June 2014, in conjunction with the 29th IFIP TC-11 SEC 2014 International Conference. It includes a revised version of the papers selected for presentation at the work- shop.
Article
Full-text available
This article discusses the implications of facilitating higher energy efficiency in cognitive radio networks from the perspective of fundamental trade-offs (i.e., what needs to be sacrificed to be energy-efficient). These trade-offs are identified as QoS, fairness, PU interference, network architecture, and security, which are also essential networ...
Conference Paper
With the ubiquitous proliferation of electronic payment systems, data and application security has become more critical for financial operations. The Payment Card Industry Data Security Standard (PCI DSS) has been developed by the payment industry to provide a widely-applicable and definitive security compliance among all components in electronic p...
Conference Paper
The recent surge in mobile broadband traffic has been accompanied by diminishing revenues per bit and spectral bottleneck for mobile cellular networks. For this purpose, cognitive radio concept embedded in smaller cells, i.e. cognitive femtocell networks (CFNs), is promising as a potential component of future heterogeneous networks. However, the on...
Conference Paper
An energy efficiency based model of content-based access schemes for multi-radio mobile user devices is developed. The content is layered video consumed by the end device. The mobile devices are assumed to have an “asymmetric” interface structure: a satellite interface and a terrestrial interface for wireless multimedia networking. The terrestrial...
Chapter
This chapter introduces the concept of cognitive femtocells and examines how the cognitive capabilities can enhance the operation of femtocells. First, basics of femtocell networks are presented with an emphasis on interference management and resource allocation. The two-layered structure of femtocell networks (i.e. macro and femto layers) and acce...
Article
With the increasing need for converged and ubiquitous broadband service support, next-generation mobile radio technologies are posed to be more efficient in different aspects such as energy and spectrum. There are also emerging critical environmental and cost concerns due to the steadily increasing energy consumption and related negative consequenc...
Article
This paper describes and discusses a heterogeneous system of satellite and IEEE 802.16 WiMAX networks collaborating for the efficient delivery of multimedia services. We first elaborate on the rationale behind integrated satellite and WiMAX networks with an overview of current research on interworking of satellite and 3G/Beyond 3G terrestrial netwo...
Article
Cognitive functions in wireless network nodes are beneficial for leveraging intricate trade-offs among energy efficiency, performance and practicality. There are two fundamental but entangled aspects of cognitive radios in the green communications context: leveraging CRs for energy efficiency and operation of CRs with energy efficiency. In practice...
Article
We define and propose a femtocell-based cognitive radio architecture for enabling multitiered opportunistic access in next-generation broadband wireless systems. This architecture combines the conventional femtocell idea with an infrastructure-based overlay cognitive network paradigm. The cognitive femtocell concept leads to simpler and easier prol...