Turgay Korkmaz’s research while affiliated with The University of Texas at San Antonio and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (3)


FIGURE 1: Traditional Edge Network
FIGURE 3: Network Broadcast
FIGURE 4: Push To Authority
FIGURE 5: Mesh Data Sharing
Snap IoT: A Decentralized Network Design Model
  • Article
  • Full-text available

January 2024

·

32 Reads

IEEE Access

Jeremy Lynn Reed

·

Ali Şaman Tosun

·

Turgay Korkmaz

IoT edge computing is a network design model that captures and processes data at the network edge. The results are forwarded to a cloud service or, if additional processing is needed, a middle tier. By processing data at the edge and middle tier, edge networks achieve better load-balancing and improve performance; however, traditional edge network deployments represent a rigid participation model. Edge networks require physical access to an IoT device and often lock the device to a single edge network. These constraints make it difficult to construct the ideal network, as they reject IoT devices deployed at the network edge but not owned by the network administrator. Our goal is to remove these limitations by creating a network protocol that supports broader participation of IoT devices, cryptographically secures network data, and improves network performance by increasing captured data at the network edge. The protocol is named Snap to symbolize the ease of self assembly. Our experimental research focuses on temperature stability and the cycle efficiency of an HVAC system by utilizing a Snap network to combine two existing edge networks and increase the number of temperature measurement points. The additional measurement points improved the efficiency of the HVAC cycle strategy by increasing the square footage of measured building space. The additional temperature capture points supported an adjustment to the HVAC cycle strategy which resulted in reducing the disparity between the requested temperature and the resulting temperatures. Snap networks support a broader range of IoT sensors leading to increased measurement density, sample rate frequency, and coverage of the network edge.

Download


FIGURE 3. Hypervisor-based and container-based virtualization.
FIGURE 4. Container application life-cycle.
FIGURE 5. An overview of Linux container architecture.
Container Technologies For ARM Architecture: A Comprehensive Survey Of The State-of-the-art

January 2022

·

506 Reads

·

34 Citations

IEEE Access

Container technology is becoming increasingly popular as an alternative to traditional virtual machines because it provides a faster, lighter, and more portable runtime environment for the applications. A container bundles the application and its binary code, libraries, and configuration files together while sharing the host operating system image. Accordingly, containers efficiently share resources and operate small micro-services, software programs, and even more extensive applications with less overhead than virtual machines. There are many container technologies available with Docker being the most popular and many technologies support multiple architectures, including the ARM architecture. Due to its energy efficiency and high-performance, which are crucial parameters in containerization, ARM architecture is becoming prevalent in container technologies. In this paper, we explore various container technologies that support ARM architecture and investigate the pros and cons of each technology. Moreover, we provide a comparative analysis of both container orchestrators and container runtimes that are most prominent competitors of Docker. We also consider security of container technologies with particular focus on the image scanning tools that supports ARM architecture. Our survey reveals that ARM technology is gaining popularity in containerization and almost all recent technologies support ARM architecture.

Citations (2)


... Code vulnerabilities have profound implications across diverse domains in the digital realm, ranging from the utilization of digital devices within IoT ecosystems and online accounts (Atashpanjeh et al. 2022) to pivotal systems like containers (Haq, Tosun, and Korkmaz 2022) and operating systems. Although anticipating specific sophisticated techniques proves challenging, most of these vulnerabilities can be attributed to developers' setbacks in ensuring robust code security. ...

Reference:

Code Security Vulnerability Repair Using Reinforcement Learning with Large Language Models
Security Analysis of Docker Containers for ARM Architecture

... However, this process often occurs manually [37]. Kaiser et al. [69] highlight several container vulnerability scanning tools, including Snyk [70], Trivy [36], Clair [71], and Anchore [72]. Among these, Trivy is particularly recognized for its effectiveness [37], demonstrating high coverage for image issues [73] and consistently detecting vulnerabilities [74]. ...

Container Technologies For ARM Architecture: A Comprehensive Survey Of The State-of-the-art

IEEE Access