<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                    <journal-id></journal-id>
            <journal-title-group>
                                                                                    <journal-title>Politeknik Dergisi</journal-title>
            </journal-title-group>
                                        <issn pub-type="epub">2147-9429</issn>
                                                                                            <publisher>
                    <publisher-name>Gazi Üniversitesi</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.2339/politeknik.627825</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Engineering</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Mühendislik</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                        <article-title>Nesnelerin İnterneti (IoT) ve Kablosuz Algılayıcı Ağların Güvenliğine Yapılan Saldırıların Tespit Edilmesi ve Önlenmesi</article-title>
                                                                                                                                                                                                <trans-title-group xml:lang="en">
                                    <trans-title>Detection and Prevention of Attacks on the Internet of Things (IoT) and Wireless Sensor Networks</trans-title>
                                </trans-title-group>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0001-5019-3574</contrib-id>
                                                                <name>
                                    <surname>Taş</surname>
                                    <given-names>Oğuzhan</given-names>
                                </name>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-0354-9344</contrib-id>
                                                                <name>
                                    <surname>Kiani</surname>
                                    <given-names>Farzad</given-names>
                                </name>
                                                                    <aff>İSTANBUL AREL ÜNİVERSİTESİ</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20210301">
                    <day>03</day>
                    <month>01</month>
                    <year>2021</year>
                </pub-date>
                                        <volume>24</volume>
                                        <issue>1</issue>
                                        <fpage>219</fpage>
                                        <lpage>235</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20191001">
                        <day>10</day>
                        <month>01</month>
                        <year>2019</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20200310">
                        <day>03</day>
                        <month>10</month>
                        <year>2020</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 1998, Politeknik Dergisi</copyright-statement>
                    <copyright-year>1998</copyright-year>
                    <copyright-holder>Politeknik Dergisi</copyright-holder>
                </permissions>
            
                                                                                                <abstract><p>IoT (Internet of Things) ya da diğer adıyla Nesnelerin İnterneti kavramı,internete bağlanan ve diğer cihazlarla iletişimde olan her nesneyikapsamaktadır. Artık hayatımızın bir parçası haline gelecek otonom araçlar,akıllı buzdolabılar, akıllı çamaşır makineleri, akıllı tost makineleri, akıllısaatler gibi birçok IoT cihazı birbiriyle farklı kablosuz ağ teknolojilerini kullanarakhaberleşebilirler. IoT cihazların birçok kritik alanda kullanılmasıylabirlikte IoT güveniğine karşı yapılan saldırılar artmıştır. Bu saldırılar IoT katmanlarına yapılarak veri gizliliği,veri bütünlüğü, veri tazeliği, veri erişilebilirliği, kimlik doğrulama gibikriterler ihlal edilebilmektedir. Bu saldırıları önlemek amacıyla birçokgüvenlik çözümü önerilmiştir, fakat sınırlı enerji, kısıtlı batarya süresi, zayıf işlemci gücü vesınırlı hafıza gibi sınırlamalardan dolayı düşük güçlü IoT cihazlar üzerinde gelenekselgüvenlik yöntemlerinin uygulanması mümkün değildir. Bu çalışmada, IoTcihazların güvenliğini tehdit eden saldırılar incelenerek, ağ katmanlarına göredetaylı şekilde sınıflandırılmış ve savunmateknikleri önerilmiştir.</p></abstract>
                                                                                                                                    <trans-abstract xml:lang="en">
                            <p>Internet of Things (IoT)covers every object that connects to the Internet and communicates with otherdevices. Many IoT devices, such as autonomous vehicles, smart refrigerators,smart washing machines, smart toasters, smart watches that can become part ofour lives and they can communicate with each other using different wirelessnetwork technologies. Because of using IoT devices in many critical areas,attacks against IoT security have increased. By making these attacks on IoTlayers, criteria such as data privacy, data integrity, data freshness, dataaccessibility and authentication can be violated. Some security solutions have beenproposed to prevent these attacks, but it is not possible to apply traditionalsecurity methods on low-power IoT devices due to some constraints such aslimited energy, limited battery time, limited computational power and limitedmemory. In this paper, attacks that threaten the security of IoT devices areexamined and classified according to network layers and defense techniques areproposed.</p></trans-abstract>
                                                            
            
                                                            <kwd-group>
                                                    <kwd>Nesnelerin İnterneti</kwd>
                                                    <kwd>  Nesnelerin İnternetinde Güvenlik</kwd>
                                                    <kwd>  Kablosuz Algılayıcı Ağların Güvenliği</kwd>
                                            </kwd-group>
                                                        
                                                                            <kwd-group xml:lang="en">
                                                    <kwd>Internet of Things</kwd>
                                                    <kwd>  Internet of Things Security</kwd>
                                                    <kwd>  Wireless Sensor Networks Security</kwd>
                                            </kwd-group>
                                                                                                            </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">I. Yaqoob, E. Ahmed, I. Hashem, A. Ahmed, A. Gani, M. Imran, M. Guizani, “Internet of Things Architecture: Recent Advances, Taxonomy, Requirements, and  Open Challenges”, IEEE Wireless Communications, 10-16, 2017.</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">J. Granjal, E. Monteiro, J.S. Silva, “Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues”, IEEE Communication Surveys &amp; Tutorials”, 7(3), 1294-1312, 2015.</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">İnternet: Gartner, “Gartner Identifies Top 10 Strategic IoT Technologies and Trends” https://www.gartner.com/en/newsroom/press-releases/2018-11-07-gartner-identifies-top-10-strategic-iot-technologies-and-trends. [Erişim Tarihi: 10.08.2019]</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">İnternet: Cisco,” Cisco Visual Networking Index: Forecast and Trends, 2017–2022 White Paper” https://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/white-paper-c11-741490.html, [Erişim Tarihi: 10.08.2019]</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">I. Tomic, J. A. McCann, “A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols”, IEEE Internet of Things Journal, 1-13, 2017.</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">V. Hassija, V. Chamola, V. Saxena, D. Jain, P. Goyal, B. Sikdar, “A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures”, IEEE Access, 82721-82740, 2019.</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">İnternet: A.K. Sikder, G. Petracca, H. Aksu, T. Jaeger, A. S. Uluagac, “A Survey on Sensor-Based Threats to Internet-of-Things (IoT) Devices and Applications”, ArXiv Preprint, https://arxiv.org/abs/1802.02041, 2018.</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">K. Chelli, “Security Issues in Wireless Sensor Networks: Attacks and Countermeasures”, Proceedings of the World Congress on Engineering, 2015.</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">S. Bisvas, S. Adhikari, “A Survey of Security Attacks, Defenses and Security Mechanisms in Wireless Sensor Network”, International Journal of Computer Applications, 2015.</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">I. Korkmaz, O. Dagdeviren, F. Tekbacak, M. Emin Dalkilic, “A Survey on Security in Wireless Sensor Networks:Attacks and Defense Mechanisms”, 223-251, Theory and Practice of Cryptography Solutions for Secure Information Systems, IGI Global, 2013.</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">C. Yadav, Raksha K., S.S. Hegde, Anjana N.C, Sandeep Kumar E, “Security Techniques in Wireless Sensor Networks : A Survey”, International Journal of Advanced Research in Computer and Communication Engineering, 2015.</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">J. P. Walters, Z. Liang, W. Shi, and V. Chaudhary, “Wireless Sensor Network Security: A Survey”, Security in Distributed, Grid and Pervasive Computing, CRC Press, 2006.</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">Y.Wang, G.Attebury, B.Ramamurthy, “A Survey of Security Issues In Wireless Sensor Networks”, IEEE Communications Survey&amp;Tutorials, 2006.</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">X. Chen, K. Makki, K. Yen, and N.  Pissinou, “Sensor Network Security: A Survey”, IEEE Communication Survey&amp;Tutorials, 2009.</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">W. Xu, K. Ma, W. Trappe, ve Y. Zhang “Jamming Sensor Networks:Attack and Defense Strategies”, Rutgers University, IEEE Network, 2006.</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">A. Mpitziopoulos, D. Gavalas, G. Pantziou, C. Konstantopoulos, “Defending Wireless Sensor Networks from Jamming Attacks”, 2007.</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">Y. Ettouijri, Y. Salij-Alj,&quot;Countermeasures against Energy-Efficient Jamming on Wireless Sensor Networks&quot;,IEEE, 2014.</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">C. Karlof, D.Wagner, “Security Wireless Sensor Networks Security”, Ad hoc networks, 2004.</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">S. Babar, A.Stango, N. R. Prasad, J. Sen, R. Prasad, “Proposed Embedded Security Framework for Internet of Things (IoT)”, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace &amp; Electronic Systems Technology (Wireless VITAE), 2011.</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">İnternet: R.Pacalet, “Hardware Security: Probing Attacks”, Telecom ParisTech, 2019,http://soc.eurecom.fr/HWSec/lectures/probing/main.pdf  [Erişim Tarihi: 22.08.2019]</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">W. Hu, J. Hider, D. Williams, A. Filipi, J. W. Davidson, D. Evans, J. C. Knight, A. N. Tuong, J. Rowanhill, “Secure and Practical Defense Against Code-injection Attacks using Software Dynamic Translation”, VEE &#039;06 Proceedings of the 2nd international conference on Virtual Execution Environments, 2006.</mixed-citation>
                    </ref>
                                    <ref id="ref22">
                        <label>22</label>
                        <mixed-citation publication-type="journal">O. Acıiçmez, J.-P. Seifert, Ç. K. Koç, “Predicting Secret Keys via Branch Prediction&quot;,CT-RSA&#039;07 Proceedings of the 7th Cryptographers&#039; track at the RSA conference on Topics in Cryptology, pp. 225-242, 2006.</mixed-citation>
                    </ref>
                                    <ref id="ref23">
                        <label>23</label>
                        <mixed-citation publication-type="journal">İnternet: T. Bhattasali, R. Chaki, S. Sanyal, “Sleep Deprivation Attack Detection in Wireless Sensor Network”, ArXiv Preprint, https://arxiv.org/ftp/arxiv/papers/1203/1203.0231.pdf, 2012</mixed-citation>
                    </ref>
                                    <ref id="ref24">
                        <label>24</label>
                        <mixed-citation publication-type="journal">V.-L. Nguyen, P. Lin, R. Hwang, “Energy Depletion Attacks in Low Power Wireless Networks”, IEEE Access Journal(Open Access), 7, 51915-51932, 2019</mixed-citation>
                    </ref>
                                    <ref id="ref25">
                        <label>25</label>
                        <mixed-citation publication-type="journal">A. Hosamsoleman, A. Payandeh, N. Mozayyani, SaeedSedighianKashi “Detection Collision Attacks In Wireless Sensor Network Usingrule-Based Packet Flow Rate”, International Journal of Engineering Research and Applications (IJERA), 2013.</mixed-citation>
                    </ref>
                                    <ref id="ref26">
                        <label>26</label>
                        <mixed-citation publication-type="journal">M. Chowdhury, M. F. Kader and Asaduzzaman, “Security Issues in Wireless Sensor Networks: A Survey”, International Journal of Future Generation Communication and Networking, 2013.</mixed-citation>
                    </ref>
                                    <ref id="ref27">
                        <label>27</label>
                        <mixed-citation publication-type="journal">Y. W. Law, L. v. Hoesel, J. Doumen, P. Hartel, and P. Havinga, &quot;Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols,&quot; presented at the Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, Alexandria, VA, USA, 2005.</mixed-citation>
                    </ref>
                                    <ref id="ref28">
                        <label>28</label>
                        <mixed-citation publication-type="journal">T. F. Abdelzaher, S. Prabh, R. Kiran, “On Real-time Capacity Limits of Multihop Wireless Sensor Networks”, IEEE Computer Society, 2004.</mixed-citation>
                    </ref>
                                    <ref id="ref29">
                        <label>29</label>
                        <mixed-citation publication-type="journal">S. Radosavac, A.A. Crdenas, J.S. Baras, and G.V. Moustakides, ”Detecting IEEE 802.11 MAC Layer Misbehavior in Ad Hoc Networks: Robust Strategies against Individual and Colluding Attackers”, Journal of Computer Security, Security of Ad Hoc and Sensor Networks, vol.15, no.1, pp. 103-128, 2007.</mixed-citation>
                    </ref>
                                    <ref id="ref30">
                        <label>30</label>
                        <mixed-citation publication-type="journal">R. Sokullu, I. Korkmaz, O. Dagdeviren, “GTS Attack: An IEEE 802.15.4 MAC Layer Attack in Wireless Sensor Networks”, International Journal On Advances in Internet Technology, 2009.</mixed-citation>
                    </ref>
                                    <ref id="ref31">
                        <label>31</label>
                        <mixed-citation publication-type="journal">S. M. Sajjad, M. Yousaf, &quot;Security Analysis of IEEE 802.15.4 MAC in the context of Internet of Things (IoT)&quot;, 2014 Conference on Information Assurance and Cyber Security (CIACS), 2014</mixed-citation>
                    </ref>
                                    <ref id="ref32">
                        <label>32</label>
                        <mixed-citation publication-type="journal">Y.Xiao, S. Sethi, H. Chen, “Security services and enhancements in the IEEE 802.15.4 wireless sensor networks”, Global Telecommunications Conference, 2005. GLOBECOM &#039;05. IEEE, 2005.</mixed-citation>
                    </ref>
                                    <ref id="ref33">
                        <label>33</label>
                        <mixed-citation publication-type="journal">P. M. Pawar, R. H. Nielsen, N. R. Prasad, S. Ohmori and R. Prasad, “Behavioural Modelling of WSN MAC Layer Security Attacks: A Sequential UML Approach”, Journal of Cyber Security and Mobility, 2012.</mixed-citation>
                    </ref>
                                    <ref id="ref34">
                        <label>34</label>
                        <mixed-citation publication-type="journal">D.R.Raymond, “Denial-of-Sleep Vulnerabilities and Defenses in Wireless Sensor Network MAC Protocols”, Phd Dissertation, Virginia Polytechnic Institute and State University, 2008.</mixed-citation>
                    </ref>
                                    <ref id="ref35">
                        <label>35</label>
                        <mixed-citation publication-type="journal">Manju.V.C, Sasikumar. “Mitigation Of Replay Attack In Wireless Sensor Network”, Int. J. on Information Technology 2014.</mixed-citation>
                    </ref>
                                    <ref id="ref36">
                        <label>36</label>
                        <mixed-citation publication-type="journal">M. Kamarei, A. Patoogy, M.Fazeli, M.J. Salehi, AT2A: Defending Unauthenticated Broadcast Attacks in Mobile Wireless Sensor Networks, International Journal of Electronics Communication and Computer Engineering, 2014.</mixed-citation>
                    </ref>
                                    <ref id="ref37">
                        <label>37</label>
                        <mixed-citation publication-type="journal">A. Perrig, R. Szewczyk, V. Wen, D. Culler, J. D. Tygar, “SPINS: Security Protocols for Sensor Networks”, Mobile Computing and Networking 2001.</mixed-citation>
                    </ref>
                                    <ref id="ref38">
                        <label>38</label>
                        <mixed-citation publication-type="journal">A. Tayebi, S. Berber, A.Swain, &quot;Wireless Sensor Network Attacks:An Overview and Critical Analysis&quot;, Seventh International Conference on Sensing Technology, 2013.</mixed-citation>
                    </ref>
                                    <ref id="ref39">
                        <label>39</label>
                        <mixed-citation publication-type="journal">K. Saghar, D. Kendall, A. Bouridane, “RAEED: A solution for HELLO flood attack”, 12th International Bhurban Conference on Applied Sciences &amp; Technology (IBCAST), 2015.</mixed-citation>
                    </ref>
                                    <ref id="ref40">
                        <label>40</label>
                        <mixed-citation publication-type="journal">Deng, R. Han, and S. Mishra. “INSENS: Intrusion-tolerant routing for wireless sensor networks”, Elsevier Journal on Computer Communications, Special Issue on Dependable Wireless Sensor Networks, v.29, 216–230, 2005.</mixed-citation>
                    </ref>
                                    <ref id="ref41">
                        <label>41</label>
                        <mixed-citation publication-type="journal">S. Zhu, S.Setia, S. Sajodia, “LEAP: Efficient Security Mechanisms for LargeScale Distributed Sensor Networks”, ACM, 2004.</mixed-citation>
                    </ref>
                                    <ref id="ref42">
                        <label>42</label>
                        <mixed-citation publication-type="journal">S. Magotra, K.Kumar, &quot;Detection of HELLO flood Attack on LEACH Protocol&quot;, 2014 IEEE International Advance Computing Conference (IACC), 2014.</mixed-citation>
                    </ref>
                                    <ref id="ref43">
                        <label>43</label>
                        <mixed-citation publication-type="journal">R. Lakhanpal, S. Sharma , Detection &amp; Prevention of Sybil Attack in Ad hoc Network using Hybrid MAP &amp; MAC Technique, 2016 International Conference on Computation of Power, Energy Information and Communication, 2016.</mixed-citation>
                    </ref>
                                    <ref id="ref44">
                        <label>44</label>
                        <mixed-citation publication-type="journal">E. C. H. Ngai, J. Liu and M. R. Lyu, “On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks”, IEEE 2006.</mixed-citation>
                    </ref>
                                    <ref id="ref45">
                        <label>45</label>
                        <mixed-citation publication-type="journal">G.Kibirige, C. Sanga, &quot;A Survey on Detection of Sinkhole Attack in Wireless Sensor Network&quot;, International Journal of Computer Science and Information Security, Vol:13(5),pp:1-9, 2015.</mixed-citation>
                    </ref>
                                    <ref id="ref46">
                        <label>46</label>
                        <mixed-citation publication-type="journal">D. M. Shila, T. Anjali, Defending selective forwarding attacks in WMNs, Electro/Information Technology, 2008.</mixed-citation>
                    </ref>
                                    <ref id="ref47">
                        <label>47</label>
                        <mixed-citation publication-type="journal">D.Martins, H. Guyennet, “Wireless Sensor Network Attacks and Security Mechanisms - A short survey”, 2009.</mixed-citation>
                    </ref>
                                    <ref id="ref48">
                        <label>48</label>
                        <mixed-citation publication-type="journal">S. Ali, M.A. Khan, J. Ahmad, A.W. Malik, A. Rehman, “Detection and Prevention of Black Hole Attacks in IoT &amp; WSN”, 2018 Third International Conference on Fog and Mobile Edge Computing, 2018.</mixed-citation>
                    </ref>
                                    <ref id="ref49">
                        <label>49</label>
                        <mixed-citation publication-type="journal">Y. Hu, A. Perrig, D.B. Johnson, “Packet Leashes: A Defense Against Wormhole Attacks in Wireless Ad Hoc Networks”, Proceedings of IEEE INFOCOM, 2003</mixed-citation>
                    </ref>
                                    <ref id="ref50">
                        <label>50</label>
                        <mixed-citation publication-type="journal">H. Chiu, K. Lui, “DelPHI: Wormhole Detection Mechanism for Ad Hoc Wireless Networks”, Proceedings of Wireless Pervasive Computing, 2006.</mixed-citation>
                    </ref>
                                    <ref id="ref51">
                        <label>51</label>
                        <mixed-citation publication-type="journal">I. Khalil, S. Bagchi, N.B. Shroff,  “LiteWorp: Detection and Isolation of the Wormhole Attack in Static Multihop Wireless Networks”, Computer Networks, Vol.51(13), pp: 3750‐3772,  2007.</mixed-citation>
                    </ref>
                                    <ref id="ref52">
                        <label>52</label>
                        <mixed-citation publication-type="journal">I. Khalil, S. Bagchi, N.B. Shroff, “MobiWorp: Mitigation of the Wormhole Attack in Mobile Multihop Wireless Networks”, Proceedings of International Conference on Security and Privacy in Communication Networks, 2006.</mixed-citation>
                    </ref>
                                    <ref id="ref53">
                        <label>53</label>
                        <mixed-citation publication-type="journal">J. Seo, G. Lee, “An Effective Wormhole Attack Defence Method for a Smart Meter Mesh Network in an Intelligent Power Grid”, Sage OpenSource Articles 2012, http://journals.sagepub.com/doi/full/10.5772/45995, Erişim Tarihi: 14.09.2018.</mixed-citation>
                    </ref>
                                    <ref id="ref54">
                        <label>54</label>
                        <mixed-citation publication-type="journal">B. Parno, A. Perrig, and V. Gligor, “Distributed detection of node replication attacks in sensor networks”, 26th IEEE Symposium on Security and Privacy, 2005.</mixed-citation>
                    </ref>
                                    <ref id="ref55">
                        <label>55</label>
                        <mixed-citation publication-type="journal">M. Conti, R. Di Pietro, L. V. Mancini, A. Mei, “A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks”, 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2007.</mixed-citation>
                    </ref>
                                    <ref id="ref56">
                        <label>56</label>
                        <mixed-citation publication-type="journal">M. Zhang, V. Khanapure, S. Chen, and X. Xiao, “Memory efficient protocols for detecting node replication attacks in wireless sensor networks,” 17th IEEE International Conference on Network Protocols, 2009.</mixed-citation>
                    </ref>
                                    <ref id="ref57">
                        <label>57</label>
                        <mixed-citation publication-type="journal">L. C. Ko, H. Y. Chen, G. R. Lin, “A neighbor-based detection scheme for wireless sensor networks against node replication attacks”, International Conference on Ultra Modern Telecommunications and Workshops, 2009.</mixed-citation>
                    </ref>
                                    <ref id="ref58">
                        <label>58</label>
                        <mixed-citation publication-type="journal">W. T. Zhu, &quot;Node Replication Attacks in Wireless Sensor Networks: Bypassing the Neighbor-Based Detection Scheme&quot;, IEEE 2011 International Conference on Network Computing and Information Security, 2011.</mixed-citation>
                    </ref>
                                    <ref id="ref59">
                        <label>59</label>
                        <mixed-citation publication-type="journal">S. Abbas, M. Merabti, D. L. Jones, &quot;Deterring Whitewashing Attacks in Reputation Based Schemes for Mobile Ad hoc Networks&quot;, IEEE 2010 IFIP Wireless Days Conference, 2010.</mixed-citation>
                    </ref>
                                    <ref id="ref60">
                        <label>60</label>
                        <mixed-citation publication-type="journal">Y. L. Sun, Z. Han, W. Yu, K.J. R. Liu,  &quot;Attacks on Trust Evaluation in Distributed Networks&quot;, 2006 40th Annual Conference on Information Sciences and Systems IEEE, 2006.</mixed-citation>
                    </ref>
                                    <ref id="ref61">
                        <label>61</label>
                        <mixed-citation publication-type="journal">S. Samreen, M.A. Jabbar, &quot;Countermeasures for Conflicting Behavior Attack in a Trust Management Framework for a Mobile Ad hoc Network&quot;, 2017 IEEE International Conference on Computational Intelligence and Computing Research, 2017.</mixed-citation>
                    </ref>
                                    <ref id="ref62">
                        <label>62</label>
                        <mixed-citation publication-type="journal">David R. Raymond, Scott F. Midkiff, “Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses”, IEEE CS Pervasive Computing pp. 74-79, 2008.</mixed-citation>
                    </ref>
                                    <ref id="ref63">
                        <label>63</label>
                        <mixed-citation publication-type="journal">R. Sathish, D.R. Kumar, &quot;Dynamic Detection of Clone Attack in Wireless Sensor Networks&quot;, IEEE 2013 International Conference on Communication Systems and Network Technologies, 2013.</mixed-citation>
                    </ref>
                                    <ref id="ref64">
                        <label>64</label>
                        <mixed-citation publication-type="journal">A. Nasridinov, J.Y. Byun, Y.H. Park, &quot;UNWRAP: An Approach on Wrapping-Attack Tolerant SOAP Messages&quot;, IEEE Second International Conference on Cloud and Green Computing, 2012.</mixed-citation>
                    </ref>
                                    <ref id="ref65">
                        <label>65</label>
                        <mixed-citation publication-type="journal">L. Bossi, E. Bertino, S. R. Hussain, &quot;A System for Profiling and Monitoring Database Access Patterns by Application Programs for Anomaly Detection&quot;, 43(5), IEEE Transactions on Software Engineering, 2017.</mixed-citation>
                    </ref>
                                    <ref id="ref66">
                        <label>66</label>
                        <mixed-citation publication-type="journal">S. O. Uwagbole, W. J. Buchanan, L. Fan, &quot;Applied Machine Learning Predictive Analytics to SQL Injection Attack Detection and Prevention&quot;, 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017.</mixed-citation>
                    </ref>
                                    <ref id="ref67">
                        <label>67</label>
                        <mixed-citation publication-type="journal">Y. Sun, D. He, “Model checking for the defense against cross-site scripting attacks”, IEEE Proceedings of the Computer Science &amp; Service System (CSSS), 2012.</mixed-citation>
                    </ref>
                                    <ref id="ref68">
                        <label>68</label>
                        <mixed-citation publication-type="journal">B. A. Khalaf, S. A. Mostafa, M. A. Mohammed, W. M. Abduallah, &quot;Comprehensive Review of Artificial Intelligence and Statistical Approaches in Distributed Denial of Service Attack and Defense Methods&quot;, IEEE Access, April 2019.</mixed-citation>
                    </ref>
                                    <ref id="ref69">
                        <label>69</label>
                        <mixed-citation publication-type="journal">O. Tas, F. Kiani, “A Survey of Attacks on Blockchain Technology”, International Journal of Informatics Technologies, 11(4), 369-382, 2018.</mixed-citation>
                    </ref>
                                    <ref id="ref70">
                        <label>70</label>
                        <mixed-citation publication-type="journal">R. Spreitzer, “Pin skimming: Exploiting the ambient-light sensor in mobile devices,” in Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones &amp; Mobile Devices, 2014.</mixed-citation>
                    </ref>
                                    <ref id="ref71">
                        <label>71</label>
                        <mixed-citation publication-type="journal">İnternet: Z. Xu, S. Zhu, “SemaDroid: A Privacy-Aware Sensor Management Framework for Smartphones”, CODASPY (2015). http://www.cse.psu.edu/~sxz16/papers/semadroid.pdf [Erişim Tarihi: 16.08.2019]</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
