Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection

Permanent URI for this collectionhttps://hdl.handle.net/11147/7148

Browse

Search Results

Now showing 1 - 6 of 6
  • Conference Object
    Duyarga Ağları için Bir Γ Eşuyumcusu Tasarım ve Uygulaması
    (IEEE, 2008) Özsoyeller, Deniz; Erciyeş, Kayhan; Dağdeviren, Orhan
    Implementation of synchronous algorithms in distributed systems in general is less troublesome than the implementation of asynchronous algorithms. Synchronizers provide synchronous execution of an asynchronous algorithm in distributed systems. In this study, we propose a gamma synchronizer for Wireless Sensor Networks (WSNs). This synchronizer consists of a and beta synchronizers. In our work, the WSN is first divided into clusters and then these clusters are connected using a ring protocol. Synchronization is provided using the beta synchronizer in the cluster and a synchronizer among the clusters. We describe the clustering algorithm and the ring formation algorithm for the WSNs and give the results obtained so far.
  • Conference Object
    Citation - Scopus: 2
    Telsiz Duyarga Ağlarında Hızlı Hareket Eden Hedefler için Küme Tabanlı Hedef İzleme Algoritması
    (Institute of Electrical and Electronics Engineers Inc., 2009) Alaybeyoğlu, Ayşegül; Dağdeviren, Orhan; Kantarcı, Aylin; Erciyes, Kayhan
    Kablosuz iletişim teknolojilerindeki ilerlemelerle birlikte telsiz duyarga ağları (TDA) birçok sivil ve askeri uygulamalarda özellikle de hareketli hedefin takibi gibi konularda yaygın olarak kullanılmaya başlanmıştır. Bu çalışmada da TDA’da hızlı hareket eden nesneler için küme tabanlı bir hedef izleme algoritması önerilmiştir. Literatürde bulunan mevcut çalışmalarda lider düğüm, hedefin sadece t+1 anında yaklaşacağı konumu tahminleyerek bu konuma en yakın düğümü uyandırır. Hedefin çok hızlı hareket etmesi durumunda ise hedefin kısa süre içerisinde bir grup düğümün yakınlarından algılanmadan geçip gitmesi söz konusudur. Önermiş olduğumuz algoritma ile hedefin hızına bağlı olarak, hedefin tahmini gideceği yöndeki düğümler önceden uyandırılarak, kümeler önceden oluşturulmaktadır. Böylece hedefin ani hızlanması durumunda, önceden oluşturmuş olduğumuz kümeler sayesinde hedefin kaybolma riskini azaltmış bulunmaktayız.
  • Book Part
    Citation - Scopus: 2
    A Survey on Security in Wireless Sensor Networks: Attacks and Defense Mechanisms
    (IGI Global, 2013) Tekbacak, Fatih; Dalkılıç, Mehmet Emin; Korkmaz, İlker; Dağdeviren, Orhan
    Wireless Sensor Network (WSN) is a promising technology that has attracted the interest of research in the last decade. Security is one of the fundamental issues in sensor networks since sensor nodes are very resource constrained. An attacker may modify, insert, and delete new hardware and software components to the system where a single node, a specific part of the sensing area, and the whole network may become inoperable. Thus, the design of early attack detection and defense mechanisms must be carefully considered. In this chapter, the authors survey attacks and their defense mechanisms in WSNs. Attacks are categorized according to the related protocol layer. They also investigate the open research issues and emerging technologies on security in WSNs.
  • Conference Object
    Citation - Scopus: 5
    A Distributed Wakening Based Target Tracking Protocol for Wireless Sensor Networks
    (Institute of Electrical and Electronics Engineers Inc., 2010) Alaybeyoğlu, Ayşegül; Dağdeviren, Orhan; Kantarcı, Aylin; Erciyeş, Kayhan
    We propose a two layer protocol for tracking fast targets in sensor networks. At the lower layer, the Distributed Spanning Tree Algorithm (DSTA) [12] partitions the network into clusters with controllable diameter and constructs a spanning tree backbone of clusterheads rooted at the sink. At the upper layer, we propose a target tracking algorithm which wakes clusters of nodes by using the estimated trajectory beforehand, which is different from existing studies [3] in which target can be detected only when the nodes close to the target are awake. We provide the simulation results and show the effect of fore-waking operation by comparing error and miss ratios of existing approaches with our proposed target tracking algorithm. © 2010 IEEE.
  • Conference Object
    Citation - WoS: 13
    Citation - Scopus: 14
    Performance Evaluation of Cluster-Based Target Tracking Protocols for Wireless Sensor Networks
    (Institute of Electrical and Electronics Engineers Inc., 2009) Alaybeyoğlu, Ayşegül; Dağdeviren, Orhan; Erciyeş, Kayhan; Kantarcı, Aylin
    Target tracking is an important application type for wireless sensor networks (WSN). Recently, various approaches [1-11] are proposed to maintain the accurate tracking of the targets as well as low energy consumption. Clustering is a fundamental technique to manage the scarce network resources [12-19]. The message complexity of an application can be significantly decreased when it is redesigned on top of a clustered network. Clustering has provided an efficient infrastructure in many existing studies [1-8]. The clusters can be constructed before the target enters the region which is called the static method [1-4] or clusters are created by using received signal strength (RSS) from target which is called the dynamic method [5-8]. In this paper we provide simulations of static and dynamic clustering algorithms against various mobility models and target speeds. The mobility models that we applied are Random Waypoint Model, Random Direct Model and Gauss Markov Model. We provide metrics to measure the tracking performance of both approaches. We show that the dynamic clustering is favorable in terms of tracking accuracy whereas the energy consumption of static clustering is significantly smaller. We also show that the target moving with Gauss Markov Model can be tracked more accurately than the other models.
  • Conference Object
    Citation - Scopus: 38
    On the Ieee 802.15.4 Mac Layer Attacks: Gts Attack
    (Institute of Electrical and Electronics Engineers Inc., 2008) Sokullu, Radosveta; Dağdeviren, Orhan; Korkmaz, İlker
    In the last several years IEEE 802.15.4 [1] has been accepted as a major MAC layer protocol for wireless sensor networks (WSNs) and has attracted the interest of the research community involved in security issues as the increased range of application scenarios bring out new possibilities for misuse and taking improper advantage of sensor nodes and their operation. As these nodes are very resource restrained such possible attacks and their early detection must be carefully considered. This paper surveys the known attacks on wireless sensor networks, identifies and investigates a new attack, Guaranteed Time Slot (GTS) attack, taking as a basis the IEEE 802.15.4 MAC protocol for WSN. The GTS Attack is simulated with different scenarios using ns-2 and the results are evaluated both from the point of view of the attacked and the attacker.