BibTex RIS Cite

Kablosuz Algılayıcı Ağlarda Ortam Erişim Protokolleri

Year 2014, Volume: 29 Issue: 1, 0 - , 25.03.2014
https://doi.org/10.17341/gummfd.27569

Abstract

Kablosuz Algılayıcı Ağlar (KAA) son yıllarda hızla gelişen ve araştırmacıların üzerinde çalıştığı konulardan biridir. Çok geniş bir kullanım alanı olan KAA’lar, askeri, sağlık, kimyasal, çevresel, endüstri alanlarında kullanılabilmekte ve saptama, iz sürme, gözlemleme gibi işlevleri yapabilmektedirler. KAA’lardaki en büyük problemlerden birisi ağda bulunan algılayıcıların kısıtlı kaynaklara sahip olmalarıdır. Sınırlı kaynakların başında da batarya ömrü gelmektedir. Literatürde algılayıcıların yaşam süresini artıracak (batarya ömrünü uzatacak) birçok çalışma yapılmıştır. Ayrıca KAA’ların günümüzde hareketli düğümler içermeleri ve askeri uygulamalar gibi güvenliğin önemli olduğu alanlarda kullanılmaları sebebiyle hareketlilik ve güvenlik de KAA’larda üzerinde durulan diğer önemli başlıklar haline gelmiştir. KAA’larda iletim ortamına erişim problemi bahsedilen üç
konuyu da doğrudan etkilemektedir ve bu nedenle literatürde ortam erişim protokolleri üzerine birçok araştırma
bulunmaktadır. Bu çalışmada KAA’larda kullanılan ortam erişim protokolleri incelenmiş ve enerji etkinliği,
hareketlilik ve güvenlik açısından değerlendirilmiştir.

References

  • Misra, S., Vaish, A., “Reputation-based role
  • assignment for role-based access control in
  • wireless sensor networks”, Computer
  • Communications, Cilt 34, 281–294, 2011.
  • Yick, J., Mukherjee, B., Ghosal, D., “Wireless
  • sensor network survey”, Computer Networks,
  • Cilt 52, 2292–2330, 2008.
  • Sabbah, E., Kang, K. D., “Guide to Wireless
  • Sensor Network”, Springer London, 489-490
  • -
  • Kulkarni, R.V., Venayagamoorth, G. K., “Neural
  • Network Based Secure Media Access Control
  • Protocol for Wireless Sensor Network”,
  • Proceedings of International Joint
  • Conference on Neural Networks, 14-19, 2009.
  • Cano, C., Bellalta, B., Sfairopoulou, A., Oliver,
  • M., “Low energy operation in WSNs: A survey
  • of preamble sampling MAC protocols”,
  • Computer Networks, Cilt 55, 3351-3363, 2011.
  • Demirkol, I., Ersoy, C., Alagoz, F., “Mac
  • protocols for wireless sensor networks: a
  • survey”, IEEE Communications Magazine,
  • Cilt 44, No 4, 115–121, 2006.
  • Ye, W., Heidemann, J., Estrin, D., “An Energy-
  • Efficient MAC Protocol for Wireless Sensor
  • Networks”, IEEE INFOCOM, Cilt 2, 1567-
  • , 2002.
  • Ali, M., Suleman, T., ve Uzmi, Z. A., “MMAC:
  • A Mobility-Adaptive, Collision-Free MAC
  • Protocol for Wireless Sensor Networks”,
  • Proceedings 24th IEEE IPCCC’05, 401-407,
  • -
  • Dener M., Bay, Ö. F., “Medium Access Control
  • Protocols For Wireless Sensor Networks:
  • Literature Survey”, G U J Sci, Cilt 25, No 2,
  • -464,2012.
  • Solehria, S. F., Jadoon, S., “Medium Access
  • Control Protocol for Wireless Sensor Networks:
  • a Survey”, IJVIPNS-IJENS, Cilt 11, No 3, 16-
  • , 2011.
  • Gunn, M., Koo, S. G. K., “A Comparative Study
  • of Medium Access Control Protocols for
  • Wireless Sensor Networks”, IJCNS, 695-703,
  • -
  • Yadav, R., Varma, S., Malaviya, N., “A Survey
  • of Mac Protocols For Wireless Sensor
  • Networks”, UbiCC Journal, Cilt 4, No 3, 827-
  • , 2009.
  • Kurose, J. F., Ross, K. W., “Computer
  • Networking: A Top-Down Approach Featuring
  • the Internet”, Addison Wesley, 2005.
  • Ray, S., Demirkol, I., Heinzelman, W., “ADVMAC:
  • Analysis and optimization of energy
  • efficiency through data advertisements for
  • wireless sensor networks”, Ad Hoc Networks,
  • Cilt 9, 876-892, 2011.
  • IEEE, IEEE Standard 802.11, Wireless LAN
  • Medium Access Control (MAC) and Physical Layer (PHY) Specifications, LAN MAN
  • Standards Committee of the IEEE Computer
  • Society, 1999.
  • Ali, M., Saif, U., Dunkels, A., Voigt, T., Römer,
  • K., Langendoen, K., Polastre, J., Uzmi, Z. A.,
  • “Medium access control issues in sensor
  • networks”, ACM SIGCOMM, Cilt 3, 3-36,
  • -
  • Kuntz, R., Gallais, A., Noel, T., “From
  • versatility to auto-adaptation of the medium
  • access control in wireless sensor networks”,
  • Journal of Parallel and Distributed
  • Computing, Cilt 71, 1236-1248, 2011.
  • Pham, H., Jha, S., “Addressing mobility in
  • wireless sensor media access control protocol”,
  • Networks and Information Processing, 113-
  • , 2004.
  • Sohrabi, K., Gao, J., Ailawadhi, V., Pottie, G.J.,
  • “Protocols for self-organization of a wireless
  • sensor network”, IEEE Personal
  • Communications, Cilt 7, No 5, 16–27, 2000.
  • Tilak, S., Abu-Ghazaleh, N., Heinzelman, W.,
  • “A taxonomy of wireless micro-sensor network
  • models”, ACM Mobile Computing and
  • Communications Review, Cilt 6, No 2, 28–36,
  • -
  • Giordano, V., Ballal, P., Lewis, F., Turchiano,
  • B., Zhang, J. B., “Supervisory Control of Mobile
  • Sensor Networks: Math Formulation,
  • Simulation, and Implementation”, IEEE
  • Transactions On Systems, Man, And
  • Cybernetics—Part B: Cybernetics, Cilt 36, No
  • , 806-819, 2006.
  • Boyle, D., Newe, T., “Securing Wireless Sensor
  • Networks: Security Architectures”, Journal of
  • Networks, Cilt 3, No 1, 65-77, 2008.
  • Akyildiz, I. F., Su, W., Sankarasubramaniam,
  • Y., Cayirci, E., “A survey on sensor Networks”,
  • IEEE Communications Magazine, Cilt 40, No
  • , 102-114, 2002.
  • Ng, H. S., Sim, M. L., Tan, C. M., “Security
  • issues of wireless sensor networks in healthcare
  • applications”, BT Technology Journal, Cilt 24,
  • No 2, 138–144, 2006.
  • IEEE, 802.11: Wireless LAN Medium Access
  • Control (MAC) and Physical Layer (PHY)
  • Specifications, IEEE Standard, 1999.
  • Kim, J., Park, K. H., “An energy-efficient,
  • transport-controlled MAC protocol for wireless
  • sensor networks”, Computer Networks, Cilt 53,
  • No 11, 1879-1902, 2009.
  • Dam, T., Langendoen, K., “An adaptive energyefficient
  • MAC protocol for wireless sensor
  • networks”, International Conference on
  • Embedded Networked Sensor Systems, 171-
  • , 2003.
  • Rajendran, V., Obraczka, K., Garcia-Luna-
  • Aceves, J., “Energy-efficient, collision-free
  • medium access control for wireless sensor
  • networks”, Proceedings of the International Conference on Embedded Networked Sensor
  • Systems (SenSys), 181–192, 2003.
  • Enz, C. C., El-Hoiydi, A., Decotignie, J-D.,
  • Peiris, V., “WiseNET: An Ultralow-Power
  • Wireless Sensor Network Solution”, IEEE
  • Computer, Cilt 37, No 8, 62-70, 2004.
  • El-Hoiydi, A., “Spatial TDMA and CSMA with
  • preamble sampling for low power ad hoc
  • wireless sensor networks”, Proceedings of
  • ISCC 2002, Seventh International Symposium
  • on Computers and Communications, 685 –
  • , 2002.
  • Polastre, J., Hill, J., Culler, D., “Versatile low
  • Power Media Access for Wireless Sensor
  • Networks”, Proceedings of the 2nd ACM
  • Conference on Embedded Networked Sensor
  • Systems (SenSys’04), 95-107, 2004.
  • El-Hoiydi, A., “Aloha with Preamble Sampling
  • for Sporadic Traffic in Ad-hoc Wireless Sensor
  • Networks”, IEEE International Conference on
  • Communications, 2002.
  • Jose, A. V., Khanna, N., Krishna, A. K.,
  • “Advanced Sensor MAC protocol to support
  • applications having different priority levels in
  • Wireless Sensor Networks”, 6th International
  • ICST Conference on Communications and
  • Networking, 340- 343, 2011.
  • Gong, H., Liu, M., Mao, Y., Chen, L., Xie, L.,
  • “Traffic Adaptive MAC Protocol for Wireless
  • Sensor Networks”, In Proceedings of
  • ICCNMC’05, 1134-1143, 2005.
  • Çakıroğlu, M., Özcerit, A.T., “Kablosuz
  • Algılayıcı Ağlarda Hizmet Engelleme
  • Saldırılarına Dayanıklı Ortam Erişim Protokolü
  • Tasarımı”, Gazi Üniv. Müh. Mim. Fak. Der.,
  • Cilt 22, No 4, 697-707, 2007.
  • Ren, Q., Liang, Q., “Fuzzy Logic-Optimized
  • Secure Media Access Control (FSMAC)
  • Protocol for Wireless Sensor Networks”, IEEE
  • Computational Intelligence for Homeland
  • Security and Personal Safety, 37-43, 2005
  • Kleinrock, L., Tobagi, F. A., “Packet switching
  • in radio channels: Part I—Carrier sense
  • multiple-access modes and their throughputdelay
  • characteristics”, IEEE Transactions on
  • Communications, Cilt 23, No 12, 1400–1416,
  • -
  • Perrig A., Szewczyk, R., Wen, V., Culler, D.,
  • Tygar, J. D., “SPINS: Security Protocols for
  • Sensor Networks”, Wireless Networks, Cilt 8,
  • -534, 2002.
  • Karlof, C., Sastry, N., ve Wagner, D., “TinySec:
  • A Link Layer Security Architecture for Wireless
  • Sensor Networks”, In Second ACM
  • Conference on Embedded Networked Sensor
  • Systems, 162-175, 2004.
  • Sultana, N., Ahmed, T., Hossain, S., “Study of a
  • new link layer Security scheme in a wireless
  • sensor network”, AIUB Journal of Science and Engineering (AJSE), Cilt 10, No 1, 79-86,
  • -
  • Luk, M., Mezzour, G., Perrig, A., Gligor. V.,
  • “MiniSec: Secure Sensor Network
  • Communication architecture”, In Proc. of the
  • th Int’l Conf. on Information Processinng in
  • Sensor Networks, 479-488, 2007.
  • Hsueh, C. T., Wen, C. Y., Ouyang, Y. C., "A
  • Secure scheme for power exhausting attacks in
  • wireless sensor networks", Ubiquitous and Future Networks (ICUFN), 2011 Third
  • International Conference on, Cilt 15, No 17,
  • -263, 2011.
  • ZigBee Alliance. Zigbee specication. Technical
  • Report Document 053474r06, Version 1.0,
  • ZigBee Alliance, 2005.
  • Krontiris, I., Dimitriou T., Soroush, H.,
  • Salajeghe, M., “WSN Link-layer Security
  • Frameworks” Athens I.
Year 2014, Volume: 29 Issue: 1, 0 - , 25.03.2014
https://doi.org/10.17341/gummfd.27569

Abstract

References

  • Misra, S., Vaish, A., “Reputation-based role
  • assignment for role-based access control in
  • wireless sensor networks”, Computer
  • Communications, Cilt 34, 281–294, 2011.
  • Yick, J., Mukherjee, B., Ghosal, D., “Wireless
  • sensor network survey”, Computer Networks,
  • Cilt 52, 2292–2330, 2008.
  • Sabbah, E., Kang, K. D., “Guide to Wireless
  • Sensor Network”, Springer London, 489-490
  • -
  • Kulkarni, R.V., Venayagamoorth, G. K., “Neural
  • Network Based Secure Media Access Control
  • Protocol for Wireless Sensor Network”,
  • Proceedings of International Joint
  • Conference on Neural Networks, 14-19, 2009.
  • Cano, C., Bellalta, B., Sfairopoulou, A., Oliver,
  • M., “Low energy operation in WSNs: A survey
  • of preamble sampling MAC protocols”,
  • Computer Networks, Cilt 55, 3351-3363, 2011.
  • Demirkol, I., Ersoy, C., Alagoz, F., “Mac
  • protocols for wireless sensor networks: a
  • survey”, IEEE Communications Magazine,
  • Cilt 44, No 4, 115–121, 2006.
  • Ye, W., Heidemann, J., Estrin, D., “An Energy-
  • Efficient MAC Protocol for Wireless Sensor
  • Networks”, IEEE INFOCOM, Cilt 2, 1567-
  • , 2002.
  • Ali, M., Suleman, T., ve Uzmi, Z. A., “MMAC:
  • A Mobility-Adaptive, Collision-Free MAC
  • Protocol for Wireless Sensor Networks”,
  • Proceedings 24th IEEE IPCCC’05, 401-407,
  • -
  • Dener M., Bay, Ö. F., “Medium Access Control
  • Protocols For Wireless Sensor Networks:
  • Literature Survey”, G U J Sci, Cilt 25, No 2,
  • -464,2012.
  • Solehria, S. F., Jadoon, S., “Medium Access
  • Control Protocol for Wireless Sensor Networks:
  • a Survey”, IJVIPNS-IJENS, Cilt 11, No 3, 16-
  • , 2011.
  • Gunn, M., Koo, S. G. K., “A Comparative Study
  • of Medium Access Control Protocols for
  • Wireless Sensor Networks”, IJCNS, 695-703,
  • -
  • Yadav, R., Varma, S., Malaviya, N., “A Survey
  • of Mac Protocols For Wireless Sensor
  • Networks”, UbiCC Journal, Cilt 4, No 3, 827-
  • , 2009.
  • Kurose, J. F., Ross, K. W., “Computer
  • Networking: A Top-Down Approach Featuring
  • the Internet”, Addison Wesley, 2005.
  • Ray, S., Demirkol, I., Heinzelman, W., “ADVMAC:
  • Analysis and optimization of energy
  • efficiency through data advertisements for
  • wireless sensor networks”, Ad Hoc Networks,
  • Cilt 9, 876-892, 2011.
  • IEEE, IEEE Standard 802.11, Wireless LAN
  • Medium Access Control (MAC) and Physical Layer (PHY) Specifications, LAN MAN
  • Standards Committee of the IEEE Computer
  • Society, 1999.
  • Ali, M., Saif, U., Dunkels, A., Voigt, T., Römer,
  • K., Langendoen, K., Polastre, J., Uzmi, Z. A.,
  • “Medium access control issues in sensor
  • networks”, ACM SIGCOMM, Cilt 3, 3-36,
  • -
  • Kuntz, R., Gallais, A., Noel, T., “From
  • versatility to auto-adaptation of the medium
  • access control in wireless sensor networks”,
  • Journal of Parallel and Distributed
  • Computing, Cilt 71, 1236-1248, 2011.
  • Pham, H., Jha, S., “Addressing mobility in
  • wireless sensor media access control protocol”,
  • Networks and Information Processing, 113-
  • , 2004.
  • Sohrabi, K., Gao, J., Ailawadhi, V., Pottie, G.J.,
  • “Protocols for self-organization of a wireless
  • sensor network”, IEEE Personal
  • Communications, Cilt 7, No 5, 16–27, 2000.
  • Tilak, S., Abu-Ghazaleh, N., Heinzelman, W.,
  • “A taxonomy of wireless micro-sensor network
  • models”, ACM Mobile Computing and
  • Communications Review, Cilt 6, No 2, 28–36,
  • -
  • Giordano, V., Ballal, P., Lewis, F., Turchiano,
  • B., Zhang, J. B., “Supervisory Control of Mobile
  • Sensor Networks: Math Formulation,
  • Simulation, and Implementation”, IEEE
  • Transactions On Systems, Man, And
  • Cybernetics—Part B: Cybernetics, Cilt 36, No
  • , 806-819, 2006.
  • Boyle, D., Newe, T., “Securing Wireless Sensor
  • Networks: Security Architectures”, Journal of
  • Networks, Cilt 3, No 1, 65-77, 2008.
  • Akyildiz, I. F., Su, W., Sankarasubramaniam,
  • Y., Cayirci, E., “A survey on sensor Networks”,
  • IEEE Communications Magazine, Cilt 40, No
  • , 102-114, 2002.
  • Ng, H. S., Sim, M. L., Tan, C. M., “Security
  • issues of wireless sensor networks in healthcare
  • applications”, BT Technology Journal, Cilt 24,
  • No 2, 138–144, 2006.
  • IEEE, 802.11: Wireless LAN Medium Access
  • Control (MAC) and Physical Layer (PHY)
  • Specifications, IEEE Standard, 1999.
  • Kim, J., Park, K. H., “An energy-efficient,
  • transport-controlled MAC protocol for wireless
  • sensor networks”, Computer Networks, Cilt 53,
  • No 11, 1879-1902, 2009.
  • Dam, T., Langendoen, K., “An adaptive energyefficient
  • MAC protocol for wireless sensor
  • networks”, International Conference on
  • Embedded Networked Sensor Systems, 171-
  • , 2003.
  • Rajendran, V., Obraczka, K., Garcia-Luna-
  • Aceves, J., “Energy-efficient, collision-free
  • medium access control for wireless sensor
  • networks”, Proceedings of the International Conference on Embedded Networked Sensor
  • Systems (SenSys), 181–192, 2003.
  • Enz, C. C., El-Hoiydi, A., Decotignie, J-D.,
  • Peiris, V., “WiseNET: An Ultralow-Power
  • Wireless Sensor Network Solution”, IEEE
  • Computer, Cilt 37, No 8, 62-70, 2004.
  • El-Hoiydi, A., “Spatial TDMA and CSMA with
  • preamble sampling for low power ad hoc
  • wireless sensor networks”, Proceedings of
  • ISCC 2002, Seventh International Symposium
  • on Computers and Communications, 685 –
  • , 2002.
  • Polastre, J., Hill, J., Culler, D., “Versatile low
  • Power Media Access for Wireless Sensor
  • Networks”, Proceedings of the 2nd ACM
  • Conference on Embedded Networked Sensor
  • Systems (SenSys’04), 95-107, 2004.
  • El-Hoiydi, A., “Aloha with Preamble Sampling
  • for Sporadic Traffic in Ad-hoc Wireless Sensor
  • Networks”, IEEE International Conference on
  • Communications, 2002.
  • Jose, A. V., Khanna, N., Krishna, A. K.,
  • “Advanced Sensor MAC protocol to support
  • applications having different priority levels in
  • Wireless Sensor Networks”, 6th International
  • ICST Conference on Communications and
  • Networking, 340- 343, 2011.
  • Gong, H., Liu, M., Mao, Y., Chen, L., Xie, L.,
  • “Traffic Adaptive MAC Protocol for Wireless
  • Sensor Networks”, In Proceedings of
  • ICCNMC’05, 1134-1143, 2005.
  • Çakıroğlu, M., Özcerit, A.T., “Kablosuz
  • Algılayıcı Ağlarda Hizmet Engelleme
  • Saldırılarına Dayanıklı Ortam Erişim Protokolü
  • Tasarımı”, Gazi Üniv. Müh. Mim. Fak. Der.,
  • Cilt 22, No 4, 697-707, 2007.
  • Ren, Q., Liang, Q., “Fuzzy Logic-Optimized
  • Secure Media Access Control (FSMAC)
  • Protocol for Wireless Sensor Networks”, IEEE
  • Computational Intelligence for Homeland
  • Security and Personal Safety, 37-43, 2005
  • Kleinrock, L., Tobagi, F. A., “Packet switching
  • in radio channels: Part I—Carrier sense
  • multiple-access modes and their throughputdelay
  • characteristics”, IEEE Transactions on
  • Communications, Cilt 23, No 12, 1400–1416,
  • -
  • Perrig A., Szewczyk, R., Wen, V., Culler, D.,
  • Tygar, J. D., “SPINS: Security Protocols for
  • Sensor Networks”, Wireless Networks, Cilt 8,
  • -534, 2002.
  • Karlof, C., Sastry, N., ve Wagner, D., “TinySec:
  • A Link Layer Security Architecture for Wireless
  • Sensor Networks”, In Second ACM
  • Conference on Embedded Networked Sensor
  • Systems, 162-175, 2004.
  • Sultana, N., Ahmed, T., Hossain, S., “Study of a
  • new link layer Security scheme in a wireless
  • sensor network”, AIUB Journal of Science and Engineering (AJSE), Cilt 10, No 1, 79-86,
  • -
  • Luk, M., Mezzour, G., Perrig, A., Gligor. V.,
  • “MiniSec: Secure Sensor Network
  • Communication architecture”, In Proc. of the
  • th Int’l Conf. on Information Processinng in
  • Sensor Networks, 479-488, 2007.
  • Hsueh, C. T., Wen, C. Y., Ouyang, Y. C., "A
  • Secure scheme for power exhausting attacks in
  • wireless sensor networks", Ubiquitous and Future Networks (ICUFN), 2011 Third
  • International Conference on, Cilt 15, No 17,
  • -263, 2011.
  • ZigBee Alliance. Zigbee specication. Technical
  • Report Document 053474r06, Version 1.0,
  • ZigBee Alliance, 2005.
  • Krontiris, I., Dimitriou T., Soroush, H.,
  • Salajeghe, M., “WSN Link-layer Security
  • Frameworks” Athens I.
There are 192 citations in total.

Details

Primary Language English
Journal Section Makaleler
Authors

Feyza Yıldırım Okay This is me

Suat Özdemir This is me

Publication Date March 25, 2014
Submission Date March 25, 2014
Published in Issue Year 2014 Volume: 29 Issue: 1

Cite

APA Yıldırım Okay, F., & Özdemir, S. (2014). Kablosuz Algılayıcı Ağlarda Ortam Erişim Protokolleri. Gazi Üniversitesi Mühendislik Mimarlık Fakültesi Dergisi, 29(1). https://doi.org/10.17341/gummfd.27569
AMA Yıldırım Okay F, Özdemir S. Kablosuz Algılayıcı Ağlarda Ortam Erişim Protokolleri. GUMMFD. March 2014;29(1). doi:10.17341/gummfd.27569
Chicago Yıldırım Okay, Feyza, and Suat Özdemir. “Kablosuz Algılayıcı Ağlarda Ortam Erişim Protokolleri”. Gazi Üniversitesi Mühendislik Mimarlık Fakültesi Dergisi 29, no. 1 (March 2014). https://doi.org/10.17341/gummfd.27569.
EndNote Yıldırım Okay F, Özdemir S (March 1, 2014) Kablosuz Algılayıcı Ağlarda Ortam Erişim Protokolleri. Gazi Üniversitesi Mühendislik Mimarlık Fakültesi Dergisi 29 1
IEEE F. Yıldırım Okay and S. Özdemir, “Kablosuz Algılayıcı Ağlarda Ortam Erişim Protokolleri”, GUMMFD, vol. 29, no. 1, 2014, doi: 10.17341/gummfd.27569.
ISNAD Yıldırım Okay, Feyza - Özdemir, Suat. “Kablosuz Algılayıcı Ağlarda Ortam Erişim Protokolleri”. Gazi Üniversitesi Mühendislik Mimarlık Fakültesi Dergisi 29/1 (March 2014). https://doi.org/10.17341/gummfd.27569.
JAMA Yıldırım Okay F, Özdemir S. Kablosuz Algılayıcı Ağlarda Ortam Erişim Protokolleri. GUMMFD. 2014;29. doi:10.17341/gummfd.27569.
MLA Yıldırım Okay, Feyza and Suat Özdemir. “Kablosuz Algılayıcı Ağlarda Ortam Erişim Protokolleri”. Gazi Üniversitesi Mühendislik Mimarlık Fakültesi Dergisi, vol. 29, no. 1, 2014, doi:10.17341/gummfd.27569.
Vancouver Yıldırım Okay F, Özdemir S. Kablosuz Algılayıcı Ağlarda Ortam Erişim Protokolleri. GUMMFD. 2014;29(1).