KABLOSUZ SENSÖR AĞLARINDA ANORMALİTE TESPİT ETMEDE ENERJİ KULLANIMININ ETKİLERİ

Kablosuz Sensör Ağları (KSA'lar) teknolojilerindeki yeni gelişmelerle birlikte, çevreselveri toplama ve işleme hizmetleri, çeşitli endüstriyel ve bilimsel alanlarda uygulanabilirdurumdadır. Bununla birlikte, KSA düğümlerinin enerji kısıtlamaları ve güvenlik açıklarıhâlâ bu alandaki teknolojik gelişmelerin ana dezavantajlarındandır. Düğümlerin enerjikullanım biçimlerini anlamak, anormal düğüm davranışlarını tespit etmeye ve kötüniyetli düğümleri önlemeye yardımcı olur. Bu çalışmada, düğümlerin enerji tüketimidavranışlarını gözlemleyerek, düğümlerin türlerine özgü aktivite biçimleri olduğusunucuna vardık. Bunun yanında, veri kaynağı, veri sorgulayıcısı ve veri yayılmayolundaki iletici düğümlerin, diğer düğümlere kıyasla, daha yüksek enerji tüketimibiçimine sahip olduğu sonucuna varmış bulunuyoruz. 

ENERGY UTILIZATION IMPACTS IN DETECTING ABNORMALITY ON WIRELESS SENSOR NETWORKS

With the novel developments in Wireless Sensor Network (WSN) technologies, environmental data collection and processing services are applied in diverse industrial and scientific areas. However, energy limitations and vulnerabilities of WSN nodes are still the main drawbacks of technological developments in the area. Understanding the energy utilization patterns of nodes helps to detect abnormal node behaviors and prevent malicious nodes. In this study, we observe the energy utilization behaviors of nodes and found that nodes have distinctive activity patterns based on their types. We also found that source, sink, and relay nodes on the data propagation path have higher energy consumption patterns compared to other nodes

___

  • Brindha, P., & Senthilkumar, A. (2019). Data dependability based bimodal encryption scheme for distributed routing in wireless sensor networks. Peer-to-Peer Networking and Applications, 1-10.
  • Hari, P. B., & Singh, S. N. (2016, April). Security issues in Wireless Sensor Networks: Current research and challenges. In 2016 International Conference on Advances in Computing, Communication, & Automation (ICACCA)(Spring) (pp. 1-6). IEEE.
  • Jadidoleslamy, H. (2017). A hierarchical multipath routing protocol in clustered wireless sensor networks. Wireless Personal Communications, 96(3), 4217-4236.
  • Kumar, S., & Jena, S. (2010, December). SCMRP: Secure cluster based multipath routing protocol for wireless sensor networks. In 2010 Sixth International conference on Wireless Communication and Sensor Networks (pp. 1-6). IEEE.
  • Mehmood, A., Lloret, J., & Sendra, S. (2016). A secure and low‐energy zone‐based wireless sensor networks routing protocol for pollution monitoring. Wireless Communications and Mobile Computing, 16(17), 2869-2883.
  • Moulad, L., Belhadaoui, H., & Rifi, M. (2017). Implementation of a hierarchical hybrid intrusion detection mechanism in wireless sensors network. Int. J. Adv. Comput. Sci. Appl., 8(10), 270-278.
  • Muthusenthil, B., & Kim, H. (2017). SHRP-Secure Hybrid Routing Protocol over Hierarchical Wireless Sensor Networks. International Journal of Computers Communications & Control, 12(6), 854-870.
  • Sahraoui, S., & Bouam, S. (2013). Secure routing optimization in hierarchical cluster-based wireless sensor networks. International Journal of Communication Networks and Information Security, 5(3), 178.
  • Yu, Y., Govindan, R., & Estrin, D. (2001). Geographical and energy aware routing: A recursive data dissemination protocol for wireless sensor networks. Technical report ucla/csd-tr-01-0023, UCLA Computer Science Department.
  • Zhang, K., Wang, C., & Wang, C. (2008, October). A secure routing protocol for cluster-based wireless sensor networks using group key management. In 2008 4th international conference on wireless communications, networking and mobile computing (pp. 1-5). IEEE.
Eskişehir Osmangazi Üniversitesi Mühendislik ve Mimarlık Fakültesi Dergisi-Cover
  • Yayın Aralığı: Yılda 3 Sayı
  • Başlangıç: 1986
  • Yayıncı: Eskişehir Osmangazi Üniversitesi