Buradasınız

KABLOSUZ ALGILAYICI AĞLARDA ORTAM ERİŞİM PROTOKOLLERİ

MEDIUM ACCESS CONTROL PROTOCOLS IN WIRELESS SENSOR NETWORKS

Journal Name:

Publication Year:

Keywords (Original Language):

Abstract (2. Language): 
The recent development of Wireless Sensor Networks (WSN) is created a hot research area that attracts many researchers. WSNs have a wide range of application areas including military, chemical, environmental and industry fields. These networks can be used for applications such as surveillance, target detection and tracking. One of the biggest problems of WSN is that sensor nodes have strictly limited resources. The main limited resource is the battery life. In the literature, many studies have been conducted to increase the lifetime of sensor nodes (i.e., extend the battery life). Due to availability of mobile nodes and mission critical applications of WSNs, mobility and security are other important issues in WSNs. Problem of shared medium access is directly related to these issues and hence there are several studies on medium access protocols in the literature. In this study, medium access protocols of WSNs are examined and evaluated with respect to energy efficiency, mobility and security.
Abstract (Original Language): 
Kablosuz Algılayıcı Ağlar (KAA) son yıllarda hızla gelişen ve araştırmacıların üzerinde çalıştığı konulardan biridir. Çok geniş bir kullanım alanı olan KAA’lar, askeri, sağlık, kimyasal, çevresel, endüstri alanlarında kullanılabilmekte ve saptama, iz sürme, gözlemleme gibi işlevleri yapabilmektedirler. KAA’lardaki en büyük problemlerden birisi ağda bulunan algılayıcıların kısıtlı kaynaklara sahip olmalarıdır. Sınırlı kaynakların başında da batarya ömrü gelmektedir. Literatürde algılayıcıların yaşam süresini artıracak (batarya ömrünü uzatacak) birçok çalışma yapılmıştır. Ayrıca KAA’ların günümüzde hareketli düğümler içermeleri ve askeri uygulamalar gibi güvenliğin önemli olduğu alanlarda kullanılmaları sebebiyle hareketlilik ve güvenlik de KAA’larda üzerinde durulan diğer önemli başlıklar haline gelmiştir. KAA’larda iletim ortamına erişim problemi bahsedilen üç konuyu da doğrudan etkilemektedir ve bu nedenle literatürde ortam erişim protokolleri üzerine birçok araştırma bulunmaktadır. Bu çalışmada KAA’larda kullanılan ortam erişim protokolleri incelenmiş ve enerji etkinliği, hareketlilik ve güvenlik açısından değerlendirilmiştir.
49
59

REFERENCES

References: 

1. Misra, S., Vaish, A., “Reputation-based role
assignment for role-based access control in
wireless sensor networks”, Computer
Communications, Cilt 34, 281–294, 2011.
2. Yick, J., Mukherjee, B., Ghosal, D., “Wireless
sensor network survey”, Computer Networks,
Cilt 52, 2292–2330, 2008.
3. Sabbah, E., Kang, K. D., “Guide to Wireless
Sensor Network”, Springer London, 489-490
2009.
4. Kulkarni, R.V., Venayagamoorth, G. K., “Neural
Network Based Secure Media Access Control
Protocol for Wireless Sensor Network”,
Proceedings of International Joint
Conference on Neural Networks, 14-19, 2009.
5. Cano, C., Bellalta, B., Sfairopoulou, A., Oliver,
M., “Low energy operation in WSNs: A survey
of preamble sampling MAC protocols”,
Computer Networks, Cilt 55, 3351-3363, 2011.
6. Demirkol, I., Ersoy, C., Alagoz, F., “Mac
protocols for wireless sensor networks: a
survey”, IEEE Communications Magazine,
Cilt 44, No 4, 115–121, 2006.
7. Ye, W., Heidemann, J., Estrin, D., “An Energy-
Efficient MAC Protocol for Wireless Sensor
Networks”, IEEE INFOCOM, Cilt 2, 1567-
1576, 2002.
8. Ali, M., Suleman, T., ve Uzmi, Z. A., “MMAC:
A Mobility-Adaptive, Collision-Free MAC
Protocol for Wireless Sensor Networks”,
Proceedings 24th IEEE IPCCC’05, 401-407,
2005.
9. Dener M., Bay, Ö. F., “Medium Access Control
Protocols For Wireless Sensor Networks:
Literature Survey”, G U J Sci, Cilt 25, No 2,
455-464,2012.
10. Solehria, S. F., Jadoon, S., “Medium Access
Control Protocol for Wireless Sensor Networks:
a Survey”, IJVIPNS-IJENS, Cilt 11, No 3, 16-
21, 2011.
11. Gunn, M., Koo, S. G. K., “A Comparative Study
of Medium Access Control Protocols for
Wireless Sensor Networks”, IJCNS, 695-703,
2009.
12. Yadav, R., Varma, S., Malaviya, N., “A Survey
of Mac Protocols For Wireless Sensor
Networks”, UbiCC Journal, Cilt 4, No 3, 827-
833, 2009.
13. Kurose, J. F., Ross, K. W., “Computer
Networking: A Top-Down Approach Featuring
the Internet”, Addison Wesley, 2005.
14. Ray, S., Demirkol, I., Heinzelman, W., “ADVMAC:
Analysis and optimization of energy
efficiency through data advertisements for
wireless sensor networks”, Ad Hoc Networks,
Cilt 9, 876-892, 2011.
15. IEEE, IEEE Standard 802.11, Wireless LAN
Medium Access Control (MAC) and Physical
F.Y. Okay ve S. Özdemir Kablosuz Algılayıcı Ağlarda Ortam Erişim Protokolleri
58 Gazi Üniv. Müh. Mim. Fak. Der. Cilt 29, No 1, 2014
Layer (PHY) Specifications, LAN MAN
Standards Committee of the IEEE Computer
Society, 1999.
16. Ali, M., Saif, U., Dunkels, A., Voigt, T., Römer,
K., Langendoen, K., Polastre, J., Uzmi, Z. A.,
“Medium access control issues in sensor
networks”, ACM SIGCOMM, Cilt 3, 3-36,
2006.
17. Kuntz, R., Gallais, A., Noel, T., “From
versatility to auto-adaptation of the medium
access control in wireless sensor networks”,
Journal of Parallel and Distributed
Computing, Cilt 71, 1236-1248, 2011.
18. Pham, H., Jha, S., “Addressing mobility in
wireless sensor media access control protocol”,
Networks and Information Processing, 113-
118, 2004.
19. Sohrabi, K., Gao, J., Ailawadhi, V., Pottie, G.J.,
“Protocols for self-organization of a wireless
sensor network”, IEEE Personal
Communications, Cilt 7, No 5, 16–27, 2000.
20. Tilak, S., Abu-Ghazaleh, N., Heinzelman, W.,
“A taxonomy of wireless micro-sensor network
models”, ACM Mobile Computing and
Communications Review, Cilt 6, No 2, 28–36,
2002.
21. Giordano, V., Ballal, P., Lewis, F., Turchiano,
B., Zhang, J. B., “Supervisory Control of Mobile
Sensor Networks: Math Formulation,
Simulation, and Implementation”, IEEE
Transactions On Systems, Man, And
Cybernetics—Part B: Cybernetics, Cilt 36, No
4, 806-819, 2006.
22. Boyle, D., Newe, T., “Securing Wireless Sensor
Networks: Security Architectures”, Journal of
Networks, Cilt 3, No 1, 65-77, 2008.
23. Akyildiz, I. F., Su, W., Sankarasubramaniam,
Y., Cayirci, E., “A survey on sensor Networks”,
IEEE Communications Magazine, Cilt 40, No
8, 102-114, 2002.
24. Ng, H. S., Sim, M. L., Tan, C. M., “Security
issues of wireless sensor networks in healthcare
applications”, BT Technology Journal, Cilt 24,
No 2, 138–144, 2006.
25. IEEE, 802.11: Wireless LAN Medium Access
Control (MAC) and Physical Layer (PHY)
Specifications, IEEE Standard, 1999.
26. Kim, J., Park, K. H., “An energy-efficient,
transport-controlled MAC protocol for wireless
sensor networks”, Computer Networks, Cilt 53,
No 11, 1879-1902, 2009.
27. Dam, T., Langendoen, K., “An adaptive energyefficient
MAC protocol for wireless sensor
networks”, International Conference on
Embedded Networked Sensor Systems, 171-
180, 2003.
28. Rajendran, V., Obraczka, K., Garcia-Luna-
Aceves, J., “Energy-efficient, collision-free
medium access control for wireless sensor
networks”, Proceedings of the International
Conference on Embedded Networked Sensor
Systems (SenSys), 181–192, 2003.
29. Enz, C. C., El-Hoiydi, A., Decotignie, J-D.,
Peiris, V., “WiseNET: An Ultralow-Power
Wireless Sensor Network Solution”, IEEE
Computer, Cilt 37, No 8, 62-70, 2004.
30. El-Hoiydi, A., “Spatial TDMA and CSMA with
preamble sampling for low power ad hoc
wireless sensor networks”, Proceedings of
ISCC 2002, Seventh International Symposium
on Computers and Communications, 685 –
692, 2002.
31. Polastre, J., Hill, J., Culler, D., “Versatile low
Power Media Access for Wireless Sensor
Networks”, Proceedings of the 2nd ACM
Conference on Embedded Networked Sensor
Systems (SenSys’04), 95-107, 2004.
32. El-Hoiydi, A., “Aloha with Preamble Sampling
for Sporadic Traffic in Ad-hoc Wireless Sensor
Networks”, IEEE International Conference on
Communications, 2002.
33. Jose, A. V., Khanna, N., Krishna, A. K.,
“Advanced Sensor MAC protocol to support
applications having different priority levels in
Wireless Sensor Networks”, 6th International
ICST Conference on Communications and
Networking, 340- 343, 2011.
34. Gong, H., Liu, M., Mao, Y., Chen, L., Xie, L.,
“Traffic Adaptive MAC Protocol for Wireless
Sensor Networks”, In Proceedings of
ICCNMC’05, 1134-1143, 2005.
35. Çakıroğlu, M., Özcerit, A.T., “Kablosuz
Algılayıcı Ağlarda Hizmet Engelleme
Saldırılarına Dayanıklı Ortam Erişim Protokolü
Tasarımı”, Gazi Üniv. Müh. Mim. Fak. Der.,
Cilt 22, No 4, 697-707, 2007.
36. Ren, Q., Liang, Q., “Fuzzy Logic-Optimized
Secure Media Access Control (FSMAC)
Protocol for Wireless Sensor Networks”, IEEE
Computational Intelligence for Homeland
Security and Personal Safety, 37-43, 2005
37. Kleinrock, L., Tobagi, F. A., “Packet switching
in radio channels: Part I—Carrier sense
multiple-access modes and their throughputdelay
characteristics”, IEEE Transactions on
Communications, Cilt 23, No 12, 1400–1416,
1975.
38. Perrig A., Szewczyk, R., Wen, V., Culler, D.,
Tygar, J. D., “SPINS: Security Protocols for
Sensor Networks”, Wireless Networks, Cilt 8,
521-534, 2002.
39. Karlof, C., Sastry, N., ve Wagner, D., “TinySec:
A Link Layer Security Architecture for Wireless
Sensor Networks”, In Second ACM
Conference on Embedded Networked Sensor
Systems, 162-175, 2004.
40. Sultana, N., Ahmed, T., Hossain, S., “Study of a
new link layer Security scheme in a wireless
sensor network”, AIUB Journal of Science and
Kablosuz Algılayıcı Ağlarda Ortam Erişim Protokolleri F.Y. Okay ve S. Özdemir
Gazi Üniv. Müh. Mim. Fak. Der. Cilt 29, No 1, 2014 59
Engineering (AJSE), Cilt 10, No 1, 79-86,
2011.
41. Luk, M., Mezzour, G., Perrig, A., Gligor. V.,
“MiniSec: Secure Sensor Network
Communication architecture”, In Proc. of the
6th Int’l Conf. on Information Processinng in
Sensor Networks, 479-488, 2007.
42. Hsueh, C. T., Wen, C. Y., Ouyang, Y. C., "A
Secure scheme for power exhausting attacks in
wireless sensor networks", Ubiquitous and
Future Networks (ICUFN), 2011 Third
International Conference on, Cilt 15, No 17,
258-263, 2011.
43. ZigBee Alliance. Zigbee specication. Technical
Report Document 053474r06, Version 1.0,
ZigBee Alliance, 2005.
44. Krontiris, I., Dimitriou T., Soroush, H.,
Salajeghe, M., “WSN Link-layer Security
Frameworks” Athens I.

Thank you for copying data from http://www.arastirmax.com