Research Article
BibTex RIS Cite
Year 2019, Volume: 5 Issue: 1, 35 - 45, 15.06.2019
https://doi.org/10.18640/ubgmd.548157

Abstract

References

  • [1] L. Gökrem, M. Bozoklu “Nesnelerin İnterneti: Yapılan Çalışmalar ve Ülkemizdeki Mevcut Durum” in Gaziosmanpaşa Bilimsel Araştırma Dergisi Sayı:13, Aralık 2016
  • [2] A. Arış, S. Oktuğ, S. Yalçın “Nesnelerin İnterneti Güvenliği: Servis Engelleme Saldırıları” in Signal Processing and Communications Applications Conference, May 2015
  • [3] T. Çavdar, E. Öztürk “Nesnelerin İnterneti için Yeni bir Mimari Tasarımı” in Sakarya Üniversitesi Fen Bilimleri Enstitüsü Dergisi, 2017
  • [4] J. Zhou, Z. Cao, X. Dong and A. V. Vasilakos, "Security and Privacy for Cloud-Based IoT: Challenges," in IEEE Communications Magazine, vol. 55, no. 1, pp. 26-33, January 2017
  • [5] A S. Elbouanani, M. A. E. Kiram and O. Achbarou, "Introduction to the Internet of Things security: Standardization and research challenges," 2015 11th International Conference on Information Assurance and Security (IAS), Marrakech, 2015, pp. 32-37
  • [6] K. Gupta and S. Shukla, "Internet of Things: Security challenges for next generation networks," 2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH), Noida, 2016, pp. 315-318
  • [7] E. Vasilomanolakis, J. Daubert, M. Luthra, V. Gazis, A. Wiesmaier and P. Kikiras, "On the Security and Privacy of Internet of Things Architectures and Systems," 2015 International Workshop on Secure Internet of Things (SIoT), Vienna, 2015, pp. 49-57
  • [8] M. Sain, Y. J. Kang, H. J. Lee “Survey on Security in Internet of things: state of the art and challenges” 2017
  • [9] Y. Yang, H. Peng, L. Li and X. Niu, "General Theory of Security and a Study Case in Internet of Things," in IEEE Internet of Things Journal, vol. 4, no. 2, pp. 592-600, April 2017
  • [10] A. Mosenia and N. K. Jha, "A Comprehensive Study of Security of Internet-of-Things," in IEEE Transactions on Emerging Topics in Computing, vol. 5, no. 4, pp. 586-602, 1 Oct.-Dec. 2017
  • [11] M. Husamuddin and M. Qayyum, "Internet of Things: A study on security and privacy threats," 2017 2nd International Conference on Anti-Cyber Crimes (ICACC), Abha, 2017, pp. 93-97
  • [12] ZigBee Alliance. 2016. zigbee alliance Accelerates IoT Unification with 20 zigbee 3.0 Platform Certifications. (December 2016). http://www.zigbee.org/zigbee-alliance-accelerates-iot-unification-with-20-zigbee-3-0-platform-certifications/
  • [13] N. Vidgren, K. Haataja, J. L. Patiño-Andres, J. J. Ramírez-Sanchis and P. Toivanen, "Security Threats in ZigBee-Enabled Systems: Vulnerability Evaluation, Practical Experiments, Countermeasures, and Lessons Learned," 2013 46th Hawaii International Conference on System Sciences, Wailea, Maui, HI, 2013, pp. 5132-5138
  • [14] X. Cao, D. M. Shila, Y. Cheng, Z. Yang, Y. Zhou and J. Chen, "Ghost-in-ZigBee: Energy Depletion Attack on ZigBee-Based Wireless Networks," in IEEE Internet of Things Journal, vol. 3, no. 5, pp. 816-829, Oct. 201
  • [15] ZigBee 3.0 Devices User Guide, 2016. https://www.nxp.com/docs/en/user-guide/JN-UG-3114.pdf
  • [16] T. Zillner, “ZigBee Exploited: the good, the bad, and the ugly” (August 16 2015).
  • [17] X. Fan, F. Susan, W. Long, S. Li, “Security Analysis of Zigbee”, MIT.edu, 2017
  • [18] P. Morgner, S. Mattejat, Z. Benenson, C. Müller, F. Armknecht, “Insecure to the Touch: Attacking ZigBee 3.0 via Touchlink Commissioning”, WiSec ’17, Boston, MA, USA
  • [19] E. Deniz and R. Samet, "A New Model for Secure Joining to ZigBee 3.0 Networks in the Internet of Things," 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT), ANKARA, Turkey, 2018, pp. 102-106
  • [20] ZigBee Specification, 2012. http://www.zigbee.org/wp-content/uploads/2014/11/docs-05-3474-20-0csg-zigbee-specification.pdf
  • [21] ZigBee Alliance, ZigBee 3.0 Stack User Guide, 2018. https://www.nxp.com/docs/en/user-guide/JN-UG-3113.pdf
  • [22] D. Gislason, “ZigBee Wireless Networking”, p. 1-2, 2008
  • [23] ZigBee Cluster Library (for ZigBee 3.0) User Guide, 2018. https://www.nxp.com/docs/en/user-guide/JN-UG-3115.pdf
  • [24] E. Masum, R. Samet “Mobil BOTNET İle DDOS Saldırısı”, Bilişim Teknolojileri dergisi, Cilt 11, Sayı 2, Sayfalar 111-121, 2018
  • [25] O. Aslan, R. Samet “Investigation of Possibilities to Detect Malware Using Existing Tools”, 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA), IEEE, pp. 1277-1284, 2017

NESNELERİN İNTERNETİNDE ZIGBEE 3.0 AĞLARINA GÜVENLİ KATILIM İÇİN YENİ BİR MODEL ÖNERİSİ

Year 2019, Volume: 5 Issue: 1, 35 - 45, 15.06.2019
https://doi.org/10.18640/ubgmd.548157

Abstract

Günümüzde
İnternet, günlük yaşamda çok önemli bir yere sahiptir. Nesnelerin İnterneti de
özellikle modern İnternet dünyasında en çok kullanılan teknolojilerden birisi
olmuştur. Nesnelerin İnterneti teknolojisi, iletişim ve haberleşme protokolleri
sayesinde nesnelere ait verileri toplayıp analizini yaparak nesneleri kontrol eder.
Yaygınlaşan akıllı nesnelerin birbiriyle iletişim halinde olması ve İnternete
bağlı olması çeşitli siber saldırılara olanak sağlamaktadır. Herhangi bir ihlal
durumunda olumsuz sonuçlar nedeniyle Nesnelerin İnternetinde güvenlik konusu
önem taşımaktadır. Bu makalede, Nesnelerin İnternetinde en çok kullanılan
teknolojilerden biri olan ZigBee ele alınmıştır. ZigBee protokolündeki güvenlik
açıklarına çözüm olarak yeni bir model önerilmiş, uygulanmış ve sonuçları
değerlendirilmiştir.

References

  • [1] L. Gökrem, M. Bozoklu “Nesnelerin İnterneti: Yapılan Çalışmalar ve Ülkemizdeki Mevcut Durum” in Gaziosmanpaşa Bilimsel Araştırma Dergisi Sayı:13, Aralık 2016
  • [2] A. Arış, S. Oktuğ, S. Yalçın “Nesnelerin İnterneti Güvenliği: Servis Engelleme Saldırıları” in Signal Processing and Communications Applications Conference, May 2015
  • [3] T. Çavdar, E. Öztürk “Nesnelerin İnterneti için Yeni bir Mimari Tasarımı” in Sakarya Üniversitesi Fen Bilimleri Enstitüsü Dergisi, 2017
  • [4] J. Zhou, Z. Cao, X. Dong and A. V. Vasilakos, "Security and Privacy for Cloud-Based IoT: Challenges," in IEEE Communications Magazine, vol. 55, no. 1, pp. 26-33, January 2017
  • [5] A S. Elbouanani, M. A. E. Kiram and O. Achbarou, "Introduction to the Internet of Things security: Standardization and research challenges," 2015 11th International Conference on Information Assurance and Security (IAS), Marrakech, 2015, pp. 32-37
  • [6] K. Gupta and S. Shukla, "Internet of Things: Security challenges for next generation networks," 2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH), Noida, 2016, pp. 315-318
  • [7] E. Vasilomanolakis, J. Daubert, M. Luthra, V. Gazis, A. Wiesmaier and P. Kikiras, "On the Security and Privacy of Internet of Things Architectures and Systems," 2015 International Workshop on Secure Internet of Things (SIoT), Vienna, 2015, pp. 49-57
  • [8] M. Sain, Y. J. Kang, H. J. Lee “Survey on Security in Internet of things: state of the art and challenges” 2017
  • [9] Y. Yang, H. Peng, L. Li and X. Niu, "General Theory of Security and a Study Case in Internet of Things," in IEEE Internet of Things Journal, vol. 4, no. 2, pp. 592-600, April 2017
  • [10] A. Mosenia and N. K. Jha, "A Comprehensive Study of Security of Internet-of-Things," in IEEE Transactions on Emerging Topics in Computing, vol. 5, no. 4, pp. 586-602, 1 Oct.-Dec. 2017
  • [11] M. Husamuddin and M. Qayyum, "Internet of Things: A study on security and privacy threats," 2017 2nd International Conference on Anti-Cyber Crimes (ICACC), Abha, 2017, pp. 93-97
  • [12] ZigBee Alliance. 2016. zigbee alliance Accelerates IoT Unification with 20 zigbee 3.0 Platform Certifications. (December 2016). http://www.zigbee.org/zigbee-alliance-accelerates-iot-unification-with-20-zigbee-3-0-platform-certifications/
  • [13] N. Vidgren, K. Haataja, J. L. Patiño-Andres, J. J. Ramírez-Sanchis and P. Toivanen, "Security Threats in ZigBee-Enabled Systems: Vulnerability Evaluation, Practical Experiments, Countermeasures, and Lessons Learned," 2013 46th Hawaii International Conference on System Sciences, Wailea, Maui, HI, 2013, pp. 5132-5138
  • [14] X. Cao, D. M. Shila, Y. Cheng, Z. Yang, Y. Zhou and J. Chen, "Ghost-in-ZigBee: Energy Depletion Attack on ZigBee-Based Wireless Networks," in IEEE Internet of Things Journal, vol. 3, no. 5, pp. 816-829, Oct. 201
  • [15] ZigBee 3.0 Devices User Guide, 2016. https://www.nxp.com/docs/en/user-guide/JN-UG-3114.pdf
  • [16] T. Zillner, “ZigBee Exploited: the good, the bad, and the ugly” (August 16 2015).
  • [17] X. Fan, F. Susan, W. Long, S. Li, “Security Analysis of Zigbee”, MIT.edu, 2017
  • [18] P. Morgner, S. Mattejat, Z. Benenson, C. Müller, F. Armknecht, “Insecure to the Touch: Attacking ZigBee 3.0 via Touchlink Commissioning”, WiSec ’17, Boston, MA, USA
  • [19] E. Deniz and R. Samet, "A New Model for Secure Joining to ZigBee 3.0 Networks in the Internet of Things," 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT), ANKARA, Turkey, 2018, pp. 102-106
  • [20] ZigBee Specification, 2012. http://www.zigbee.org/wp-content/uploads/2014/11/docs-05-3474-20-0csg-zigbee-specification.pdf
  • [21] ZigBee Alliance, ZigBee 3.0 Stack User Guide, 2018. https://www.nxp.com/docs/en/user-guide/JN-UG-3113.pdf
  • [22] D. Gislason, “ZigBee Wireless Networking”, p. 1-2, 2008
  • [23] ZigBee Cluster Library (for ZigBee 3.0) User Guide, 2018. https://www.nxp.com/docs/en/user-guide/JN-UG-3115.pdf
  • [24] E. Masum, R. Samet “Mobil BOTNET İle DDOS Saldırısı”, Bilişim Teknolojileri dergisi, Cilt 11, Sayı 2, Sayfalar 111-121, 2018
  • [25] O. Aslan, R. Samet “Investigation of Possibilities to Detect Malware Using Existing Tools”, 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA), IEEE, pp. 1277-1284, 2017
There are 25 citations in total.

Details

Primary Language Turkish
Subjects Engineering
Journal Section Makaleler
Authors

Emre Deniz 0000-0002-6627-1386

Refik Samet 0000-0001-8720-6834

Publication Date June 15, 2019
Submission Date April 2, 2019
Published in Issue Year 2019 Volume: 5 Issue: 1

Cite

IEEE E. Deniz and R. Samet, “NESNELERİN İNTERNETİNDE ZIGBEE 3.0 AĞLARINA GÜVENLİ KATILIM İÇİN YENİ BİR MODEL ÖNERİSİ”, UBGMD, vol. 5, no. 1, pp. 35–45, 2019, doi: 10.18640/ubgmd.548157.

Cited By

ÜLKE GÜVENLİĞİMİZDE ALINABİLECEK MAKRO SİBER GÜVENLİK ÖNLEMLERİ
ULUSLARARASI BİLGİ GÜVENLİĞİ MÜHENDİSLİĞİ DERGİSİ
Tayfun ACARER
https://doi.org/10.18640/ubgmd.796168

Giyilebilir Teknolojiler Üzerine Bir Araştırma
Harran Üniversitesi Mühendislik Dergisi
Ahmet ÇİFTÇİ
https://doi.org/10.46578/humder.903092