Araştırma Makalesi
BibTex RIS Kaynak Göster
Yıl 2019, Cilt: 5 Sayı: 1, 35 - 45, 15.06.2019
https://doi.org/10.18640/ubgmd.548157

Öz

Kaynakça

  • [1] L. Gökrem, M. Bozoklu “Nesnelerin İnterneti: Yapılan Çalışmalar ve Ülkemizdeki Mevcut Durum” in Gaziosmanpaşa Bilimsel Araştırma Dergisi Sayı:13, Aralık 2016
  • [2] A. Arış, S. Oktuğ, S. Yalçın “Nesnelerin İnterneti Güvenliği: Servis Engelleme Saldırıları” in Signal Processing and Communications Applications Conference, May 2015
  • [3] T. Çavdar, E. Öztürk “Nesnelerin İnterneti için Yeni bir Mimari Tasarımı” in Sakarya Üniversitesi Fen Bilimleri Enstitüsü Dergisi, 2017
  • [4] J. Zhou, Z. Cao, X. Dong and A. V. Vasilakos, "Security and Privacy for Cloud-Based IoT: Challenges," in IEEE Communications Magazine, vol. 55, no. 1, pp. 26-33, January 2017
  • [5] A S. Elbouanani, M. A. E. Kiram and O. Achbarou, "Introduction to the Internet of Things security: Standardization and research challenges," 2015 11th International Conference on Information Assurance and Security (IAS), Marrakech, 2015, pp. 32-37
  • [6] K. Gupta and S. Shukla, "Internet of Things: Security challenges for next generation networks," 2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH), Noida, 2016, pp. 315-318
  • [7] E. Vasilomanolakis, J. Daubert, M. Luthra, V. Gazis, A. Wiesmaier and P. Kikiras, "On the Security and Privacy of Internet of Things Architectures and Systems," 2015 International Workshop on Secure Internet of Things (SIoT), Vienna, 2015, pp. 49-57
  • [8] M. Sain, Y. J. Kang, H. J. Lee “Survey on Security in Internet of things: state of the art and challenges” 2017
  • [9] Y. Yang, H. Peng, L. Li and X. Niu, "General Theory of Security and a Study Case in Internet of Things," in IEEE Internet of Things Journal, vol. 4, no. 2, pp. 592-600, April 2017
  • [10] A. Mosenia and N. K. Jha, "A Comprehensive Study of Security of Internet-of-Things," in IEEE Transactions on Emerging Topics in Computing, vol. 5, no. 4, pp. 586-602, 1 Oct.-Dec. 2017
  • [11] M. Husamuddin and M. Qayyum, "Internet of Things: A study on security and privacy threats," 2017 2nd International Conference on Anti-Cyber Crimes (ICACC), Abha, 2017, pp. 93-97
  • [12] ZigBee Alliance. 2016. zigbee alliance Accelerates IoT Unification with 20 zigbee 3.0 Platform Certifications. (December 2016). http://www.zigbee.org/zigbee-alliance-accelerates-iot-unification-with-20-zigbee-3-0-platform-certifications/
  • [13] N. Vidgren, K. Haataja, J. L. Patiño-Andres, J. J. Ramírez-Sanchis and P. Toivanen, "Security Threats in ZigBee-Enabled Systems: Vulnerability Evaluation, Practical Experiments, Countermeasures, and Lessons Learned," 2013 46th Hawaii International Conference on System Sciences, Wailea, Maui, HI, 2013, pp. 5132-5138
  • [14] X. Cao, D. M. Shila, Y. Cheng, Z. Yang, Y. Zhou and J. Chen, "Ghost-in-ZigBee: Energy Depletion Attack on ZigBee-Based Wireless Networks," in IEEE Internet of Things Journal, vol. 3, no. 5, pp. 816-829, Oct. 201
  • [15] ZigBee 3.0 Devices User Guide, 2016. https://www.nxp.com/docs/en/user-guide/JN-UG-3114.pdf
  • [16] T. Zillner, “ZigBee Exploited: the good, the bad, and the ugly” (August 16 2015).
  • [17] X. Fan, F. Susan, W. Long, S. Li, “Security Analysis of Zigbee”, MIT.edu, 2017
  • [18] P. Morgner, S. Mattejat, Z. Benenson, C. Müller, F. Armknecht, “Insecure to the Touch: Attacking ZigBee 3.0 via Touchlink Commissioning”, WiSec ’17, Boston, MA, USA
  • [19] E. Deniz and R. Samet, "A New Model for Secure Joining to ZigBee 3.0 Networks in the Internet of Things," 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT), ANKARA, Turkey, 2018, pp. 102-106
  • [20] ZigBee Specification, 2012. http://www.zigbee.org/wp-content/uploads/2014/11/docs-05-3474-20-0csg-zigbee-specification.pdf
  • [21] ZigBee Alliance, ZigBee 3.0 Stack User Guide, 2018. https://www.nxp.com/docs/en/user-guide/JN-UG-3113.pdf
  • [22] D. Gislason, “ZigBee Wireless Networking”, p. 1-2, 2008
  • [23] ZigBee Cluster Library (for ZigBee 3.0) User Guide, 2018. https://www.nxp.com/docs/en/user-guide/JN-UG-3115.pdf
  • [24] E. Masum, R. Samet “Mobil BOTNET İle DDOS Saldırısı”, Bilişim Teknolojileri dergisi, Cilt 11, Sayı 2, Sayfalar 111-121, 2018
  • [25] O. Aslan, R. Samet “Investigation of Possibilities to Detect Malware Using Existing Tools”, 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA), IEEE, pp. 1277-1284, 2017

NESNELERİN İNTERNETİNDE ZIGBEE 3.0 AĞLARINA GÜVENLİ KATILIM İÇİN YENİ BİR MODEL ÖNERİSİ

Yıl 2019, Cilt: 5 Sayı: 1, 35 - 45, 15.06.2019
https://doi.org/10.18640/ubgmd.548157

Öz

Günümüzde
İnternet, günlük yaşamda çok önemli bir yere sahiptir. Nesnelerin İnterneti de
özellikle modern İnternet dünyasında en çok kullanılan teknolojilerden birisi
olmuştur. Nesnelerin İnterneti teknolojisi, iletişim ve haberleşme protokolleri
sayesinde nesnelere ait verileri toplayıp analizini yaparak nesneleri kontrol eder.
Yaygınlaşan akıllı nesnelerin birbiriyle iletişim halinde olması ve İnternete
bağlı olması çeşitli siber saldırılara olanak sağlamaktadır. Herhangi bir ihlal
durumunda olumsuz sonuçlar nedeniyle Nesnelerin İnternetinde güvenlik konusu
önem taşımaktadır. Bu makalede, Nesnelerin İnternetinde en çok kullanılan
teknolojilerden biri olan ZigBee ele alınmıştır. ZigBee protokolündeki güvenlik
açıklarına çözüm olarak yeni bir model önerilmiş, uygulanmış ve sonuçları
değerlendirilmiştir.

Kaynakça

  • [1] L. Gökrem, M. Bozoklu “Nesnelerin İnterneti: Yapılan Çalışmalar ve Ülkemizdeki Mevcut Durum” in Gaziosmanpaşa Bilimsel Araştırma Dergisi Sayı:13, Aralık 2016
  • [2] A. Arış, S. Oktuğ, S. Yalçın “Nesnelerin İnterneti Güvenliği: Servis Engelleme Saldırıları” in Signal Processing and Communications Applications Conference, May 2015
  • [3] T. Çavdar, E. Öztürk “Nesnelerin İnterneti için Yeni bir Mimari Tasarımı” in Sakarya Üniversitesi Fen Bilimleri Enstitüsü Dergisi, 2017
  • [4] J. Zhou, Z. Cao, X. Dong and A. V. Vasilakos, "Security and Privacy for Cloud-Based IoT: Challenges," in IEEE Communications Magazine, vol. 55, no. 1, pp. 26-33, January 2017
  • [5] A S. Elbouanani, M. A. E. Kiram and O. Achbarou, "Introduction to the Internet of Things security: Standardization and research challenges," 2015 11th International Conference on Information Assurance and Security (IAS), Marrakech, 2015, pp. 32-37
  • [6] K. Gupta and S. Shukla, "Internet of Things: Security challenges for next generation networks," 2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH), Noida, 2016, pp. 315-318
  • [7] E. Vasilomanolakis, J. Daubert, M. Luthra, V. Gazis, A. Wiesmaier and P. Kikiras, "On the Security and Privacy of Internet of Things Architectures and Systems," 2015 International Workshop on Secure Internet of Things (SIoT), Vienna, 2015, pp. 49-57
  • [8] M. Sain, Y. J. Kang, H. J. Lee “Survey on Security in Internet of things: state of the art and challenges” 2017
  • [9] Y. Yang, H. Peng, L. Li and X. Niu, "General Theory of Security and a Study Case in Internet of Things," in IEEE Internet of Things Journal, vol. 4, no. 2, pp. 592-600, April 2017
  • [10] A. Mosenia and N. K. Jha, "A Comprehensive Study of Security of Internet-of-Things," in IEEE Transactions on Emerging Topics in Computing, vol. 5, no. 4, pp. 586-602, 1 Oct.-Dec. 2017
  • [11] M. Husamuddin and M. Qayyum, "Internet of Things: A study on security and privacy threats," 2017 2nd International Conference on Anti-Cyber Crimes (ICACC), Abha, 2017, pp. 93-97
  • [12] ZigBee Alliance. 2016. zigbee alliance Accelerates IoT Unification with 20 zigbee 3.0 Platform Certifications. (December 2016). http://www.zigbee.org/zigbee-alliance-accelerates-iot-unification-with-20-zigbee-3-0-platform-certifications/
  • [13] N. Vidgren, K. Haataja, J. L. Patiño-Andres, J. J. Ramírez-Sanchis and P. Toivanen, "Security Threats in ZigBee-Enabled Systems: Vulnerability Evaluation, Practical Experiments, Countermeasures, and Lessons Learned," 2013 46th Hawaii International Conference on System Sciences, Wailea, Maui, HI, 2013, pp. 5132-5138
  • [14] X. Cao, D. M. Shila, Y. Cheng, Z. Yang, Y. Zhou and J. Chen, "Ghost-in-ZigBee: Energy Depletion Attack on ZigBee-Based Wireless Networks," in IEEE Internet of Things Journal, vol. 3, no. 5, pp. 816-829, Oct. 201
  • [15] ZigBee 3.0 Devices User Guide, 2016. https://www.nxp.com/docs/en/user-guide/JN-UG-3114.pdf
  • [16] T. Zillner, “ZigBee Exploited: the good, the bad, and the ugly” (August 16 2015).
  • [17] X. Fan, F. Susan, W. Long, S. Li, “Security Analysis of Zigbee”, MIT.edu, 2017
  • [18] P. Morgner, S. Mattejat, Z. Benenson, C. Müller, F. Armknecht, “Insecure to the Touch: Attacking ZigBee 3.0 via Touchlink Commissioning”, WiSec ’17, Boston, MA, USA
  • [19] E. Deniz and R. Samet, "A New Model for Secure Joining to ZigBee 3.0 Networks in the Internet of Things," 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT), ANKARA, Turkey, 2018, pp. 102-106
  • [20] ZigBee Specification, 2012. http://www.zigbee.org/wp-content/uploads/2014/11/docs-05-3474-20-0csg-zigbee-specification.pdf
  • [21] ZigBee Alliance, ZigBee 3.0 Stack User Guide, 2018. https://www.nxp.com/docs/en/user-guide/JN-UG-3113.pdf
  • [22] D. Gislason, “ZigBee Wireless Networking”, p. 1-2, 2008
  • [23] ZigBee Cluster Library (for ZigBee 3.0) User Guide, 2018. https://www.nxp.com/docs/en/user-guide/JN-UG-3115.pdf
  • [24] E. Masum, R. Samet “Mobil BOTNET İle DDOS Saldırısı”, Bilişim Teknolojileri dergisi, Cilt 11, Sayı 2, Sayfalar 111-121, 2018
  • [25] O. Aslan, R. Samet “Investigation of Possibilities to Detect Malware Using Existing Tools”, 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA), IEEE, pp. 1277-1284, 2017
Toplam 25 adet kaynakça vardır.

Ayrıntılar

Birincil Dil Türkçe
Konular Mühendislik
Bölüm Makaleler
Yazarlar

Emre Deniz 0000-0002-6627-1386

Refik Samet 0000-0001-8720-6834

Yayımlanma Tarihi 15 Haziran 2019
Gönderilme Tarihi 2 Nisan 2019
Yayımlandığı Sayı Yıl 2019 Cilt: 5 Sayı: 1

Kaynak Göster

IEEE E. Deniz ve R. Samet, “NESNELERİN İNTERNETİNDE ZIGBEE 3.0 AĞLARINA GÜVENLİ KATILIM İÇİN YENİ BİR MODEL ÖNERİSİ”, UBGMD, c. 5, sy. 1, ss. 35–45, 2019, doi: 10.18640/ubgmd.548157.

Cited By

ÜLKE GÜVENLİĞİMİZDE ALINABİLECEK MAKRO SİBER GÜVENLİK ÖNLEMLERİ
ULUSLARARASI BİLGİ GÜVENLİĞİ MÜHENDİSLİĞİ DERGİSİ
Tayfun ACARER
https://doi.org/10.18640/ubgmd.796168

Giyilebilir Teknolojiler Üzerine Bir Araştırma
Harran Üniversitesi Mühendislik Dergisi
Ahmet ÇİFTÇİ
https://doi.org/10.46578/humder.903092