Skip to main content

Showing 1–8 of 8 results for author: Aydeger, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.17133  [pdf, other

    quant-ph cs.NI

    Quantum Technologies for Beyond 5G and 6G Networks: Applications, Opportunities, and Challenges

    Authors: Engin Zeydan, Chamitha De Alwis, Rabia Khan, Yekta Turk, Abdullah Aydeger, Thippa Reddy Gadekallu, Madhusanka Liyanage

    Abstract: As the world prepares for the advent of 6G networks, quantum technologies are becoming critical enablers of the next generation of communication systems. This survey paper investigates the convergence of quantum technologies and 6G networks, focusing on their applications, opportunities and challenges. We begin with an examination of the motivations for integrating quantum technologies into 6G, in… ▽ More

    Submitted 23 April, 2025; originally announced April 2025.

    Comments: 30 pages, 6 figures, 10 tables

  2. arXiv:2502.09726  [pdf, other

    cs.CR cs.NI cs.PF

    Analysis of Robust and Secure DNS Protocols for IoT Devices

    Authors: Abdullah Aydeger, Sanzida Hoque, Engin Zeydan, Kapal Dev

    Abstract: The DNS (Domain Name System) protocol has been in use since the early days of the Internet. Although DNS as a de facto networking protocol had no security considerations in its early years, there have been many security enhancements, such as DNSSec (Domain Name System Security Extensions), DoT (DNS over Transport Layer Security), DoH (DNS over HTTPS) and DoQ (DNS over QUIC). With all these securit… ▽ More

    Submitted 13 February, 2025; originally announced February 2025.

    Comments: 6 pages, 2 tables, 2 figures. This paper has been accepted in the 2025 IEEE International Conference on Communications (ICC): SAC Cloud Computing, Networking, and Storage Track. The final version will be published in the IEEE Xplore

  3. arXiv:2410.02254  [pdf, other

    cs.NI cs.CR cs.DC cs.ET

    MTDNS: Moving Target Defense for Resilient DNS Infrastructure

    Authors: Abdullah Aydeger, Pei Zhou, Sanzida Hoque, Marco Carvalho, Engin Zeydan

    Abstract: One of the most critical components of the Internet that an attacker could exploit is the DNS (Domain Name System) protocol and infrastructure. Researchers have been constantly developing methods to detect and defend against the attacks against DNS, specifically DNS flooding attacks. However, most solutions discard packets for defensive approaches, which can cause legitimate packets to be dropped,… ▽ More

    Submitted 3 October, 2024; originally announced October 2024.

    Comments: 6 pages, Accepted for publication at IEEE CCNC 2025

  4. arXiv:2408.11117  [pdf, other

    cs.CR cs.NI

    Post-Quantum Secure UE-to-UE Communications

    Authors: Sanzida Hoque, Abdullah Aydeger, Engin Zeydan

    Abstract: The rapid development of quantum computing poses a significant threat to the security of current cryptographic systems, including those used in User Equipment (UE) for mobile communications. Conventional cryptographic algorithms such as Rivest-Shamir-Adleman (RSA) and Elliptic curve cryptography (ECC) are vulnerable to quantum computing attacks, which could jeopardize the confidentiality, integrit… ▽ More

    Submitted 20 August, 2024; originally announced August 2024.

    Comments: 3 pages, 2 figures, Accepted for NoF 2024 Demo track

  5. arXiv:2407.20100  [pdf, other

    cs.LG cs.AI cs.CR cs.NI

    F-KANs: Federated Kolmogorov-Arnold Networks

    Authors: Engin Zeydan, Cristian J. Vaca-Rubio, Luis Blanco, Roberto Pereira, Marius Caus, Abdullah Aydeger

    Abstract: In this paper, we present an innovative federated learning (FL) approach that utilizes Kolmogorov-Arnold Networks (KANs) for classification tasks. By utilizing the adaptive activation capabilities of KANs in a federated framework, we aim to improve classification capabilities while preserving privacy. The study evaluates the performance of federated KANs (F- KANs) compared to traditional Multi-Lay… ▽ More

    Submitted 8 November, 2024; v1 submitted 29 July, 2024; originally announced July 2024.

    Comments: This work has been accepted to 1st International Workshop on Distributed AI for Enhanced Wireless Networks (DAINET'25) in conjunction with IEEE Consumer Communications & Networking Conference 2025. Related Code: https://github.com/ezeydan/F-KANs.git

  6. arXiv:2404.10602  [pdf, other

    cs.CR cs.NI

    Exploring Post Quantum Cryptography with Quantum Key Distribution for Sustainable Mobile Network Architecture Design

    Authors: Sanzida Hoque, Abdullah Aydeger, Engin Zeydan

    Abstract: The proliferation of mobile networks and their increasing importance to modern life, combined with the emerging threat of quantum computing, present new challenges and opportunities for cybersecurity. This paper addresses the complexity of protecting these critical infrastructures against future quantum attacks while considering operational sustainability. We begin with an overview of the current… ▽ More

    Submitted 16 April, 2024; originally announced April 2024.

    Comments: This paper has been accepted for publication by the 33rd International Symposium on High-Performance Parallel and Distributed Computing (HPDC) 2024. The copyright is with the ACM and the final version will be published by the ACM

  7. arXiv:2305.19451  [pdf, other

    cs.NI

    Bringing DNS Service to 5G Edge for Reduced Latencies in mMTC Applications

    Authors: Ricardo Harrilal-Parchment, Diana Pineda, Kemal Akkaya, Abdullah Aydeger, Alexander Perez-Pons

    Abstract: 5G brings many improvements to cellular networks in terms of performance, such as lower latency, improved network efficiency, and higher throughput, making it an attractive candidate for many applications. One such domain is industrial applications that may require real-time guarantees to transmit time-critical control messages. Assuming the immense number of devices exchanging data in support of… ▽ More

    Submitted 30 May, 2023; originally announced May 2023.

    Comments: Accepted to IEEE ICIT 2023

  8. arXiv:1912.10073  [pdf, other

    cs.NI cs.GT

    Strategic Defense against Stealthy Link Flooding Attacks: A Signaling Game Approach

    Authors: Abdullah Aydeger, Mohammad Hossein Manshaei, Mohammad Ashiqur Rahman, Kemal Akkaya

    Abstract: With the increasing diversity of Distributed Denial-of-Service (DDoS) attacks, it is becoming extremely challenging to design a fully protected network. For instance, Stealthy Link Flooding Attack (SLFA) is a variant of DDoS attacks that strives to block access to a target area by flooding a small set of links, and it is shown that it can bypass traditional DDoS defense mechanisms. One potential s… ▽ More

    Submitted 20 December, 2019; originally announced December 2019.