Computer Engineering / Bilgisayar Mühendisliği
Permanent URI for this collectionhttps://hdl.handle.net/11147/10
Browse
3 results
Search Results
Now showing 1 - 3 of 3
Book Part Citation - Scopus: 2A Survey on Security in Wireless Sensor Networks: Attacks and Defense Mechanisms(IGI Global, 2013) Tekbacak, Fatih; Dalkılıç, Mehmet Emin; Korkmaz, İlker; Dağdeviren, OrhanWireless Sensor Network (WSN) is a promising technology that has attracted the interest of research in the last decade. Security is one of the fundamental issues in sensor networks since sensor nodes are very resource constrained. An attacker may modify, insert, and delete new hardware and software components to the system where a single node, a specific part of the sensing area, and the whole network may become inoperable. Thus, the design of early attack detection and defense mechanisms must be carefully considered. In this chapter, the authors survey attacks and their defense mechanisms in WSNs. Attacks are categorized according to the related protocol layer. They also investigate the open research issues and emerging technologies on security in WSNs.Article Citation - WoS: 14Citation - Scopus: 21A Survey of Agent Technologies for Wireless Sensor Networks(Medknow Publications and Media, 2011) Dagdeviren, Orhan; Korkmaz, İlker; Tekbacak, Fatih; Erciyeş, KayhanWireless sensor networks (WSNs) do not have a fixed infrastructure and consist of sensor nodes that perform sensing and communicating tasks. The WSNs have large application spectrum such as habitat monitoring, military surveillance, and target tracking, where sensor nodes may operate distributed in highly dynamic environments. Battery-constrained sensor nodes may aggregate the sensed data, localize themselves, and route the packets in an energy-efficient and decentralized manner to enable running the applications. Agents are capable of independent and autonomous action, so that they can successfully carry out tasks that have been delegated to them, thus agent-based approaches are very suitable to apply as the solution of the problems occurring in WSNs. So far many agent-based approaches were proposed for WSNs. This paper surveys the agent technologies for sensor networks by providing a classification, objectives and costs of these approaches with the open research problems. To the best of our knowledge, this is the first study that covers the intersection of the agent technology and sensor networks from a wide perspective.Conference Object Citation - Scopus: 38On the Ieee 802.15.4 Mac Layer Attacks: Gts Attack(Institute of Electrical and Electronics Engineers Inc., 2008) Sokullu, Radosveta; Dağdeviren, Orhan; Korkmaz, İlkerIn the last several years IEEE 802.15.4 [1] has been accepted as a major MAC layer protocol for wireless sensor networks (WSNs) and has attracted the interest of the research community involved in security issues as the increased range of application scenarios bring out new possibilities for misuse and taking improper advantage of sensor nodes and their operation. As these nodes are very resource restrained such possible attacks and their early detection must be carefully considered. This paper surveys the known attacks on wireless sensor networks, identifies and investigates a new attack, Guaranteed Time Slot (GTS) attack, taking as a basis the IEEE 802.15.4 MAC protocol for WSN. The GTS Attack is simulated with different scenarios using ns-2 and the results are evaluated both from the point of view of the attacked and the attacker.
