Kablosuz Algılayıcı Ağlarda Ortam Erişim Protokolleri

Kablosuz Algılayıcı Ağlar (KAA) son yıllarda hızla gelişen ve araştırmacıların üzerinde çalıştığı konulardan biridir. Çok geniş bir kullanım alanı olan KAA’lar, askeri, sağlık, kimyasal, çevresel, endüstri alanlarında kullanılabilmekte ve saptama, iz sürme, gözlemleme gibi işlevleri yapabilmektedirler. KAA’lardaki en büyük problemlerden birisi ağda bulunan algılayıcıların kısıtlı kaynaklara sahip olmalarıdır. Sınırlı kaynakların başında da batarya ömrü gelmektedir. Literatürde algılayıcıların yaşam süresini artıracak (batarya ömrünü uzatacak) birçok çalışma yapılmıştır. Ayrıca KAA’ların günümüzde hareketli düğümler içermeleri ve askeri uygulamalar gibi güvenliğin önemli olduğu alanlarda kullanılmaları sebebiyle hareketlilik ve güvenlik de KAA’larda üzerinde durulan diğer önemli başlıklar haline gelmiştir. KAA’larda iletim ortamına erişim problemi bahsedilen üçkonuyu da doğrudan etkilemektedir ve bu nedenle literatürde ortam erişim protokolleri üzerine birçok araştırmabulunmaktadır. Bu çalışmada KAA’larda kullanılan ortam erişim protokolleri incelenmiş ve enerji etkinliği,hareketlilik ve güvenlik açısından değerlendirilmiştir.

___

  • Misra, S., Vaish, A., “Reputation-based role
  • assignment for role-based access control in
  • wireless sensor networks”, Computer
  • Communications, Cilt 34, 281–294, 2011.
  • Yick, J., Mukherjee, B., Ghosal, D., “Wireless
  • sensor network survey”, Computer Networks,
  • Cilt 52, 2292–2330, 2008.
  • Sabbah, E., Kang, K. D., “Guide to Wireless
  • Sensor Network”, Springer London, 489-490
  • -
  • Kulkarni, R.V., Venayagamoorth, G. K., “Neural
  • Network Based Secure Media Access Control
  • Protocol for Wireless Sensor Network”,
  • Proceedings of International Joint
  • Conference on Neural Networks, 14-19, 2009.
  • Cano, C., Bellalta, B., Sfairopoulou, A., Oliver,
  • M., “Low energy operation in WSNs: A survey
  • of preamble sampling MAC protocols”,
  • Computer Networks, Cilt 55, 3351-3363, 2011.
  • Demirkol, I., Ersoy, C., Alagoz, F., “Mac
  • protocols for wireless sensor networks: a
  • survey”, IEEE Communications Magazine,
  • Cilt 44, No 4, 115–121, 2006.
  • Ye, W., Heidemann, J., Estrin, D., “An Energy-
  • Efficient MAC Protocol for Wireless Sensor
  • Networks”, IEEE INFOCOM, Cilt 2, 1567-
  • , 2002.
  • Ali, M., Suleman, T., ve Uzmi, Z. A., “MMAC:
  • A Mobility-Adaptive, Collision-Free MAC
  • Protocol for Wireless Sensor Networks”,
  • Proceedings 24th IEEE IPCCC’05, 401-407,
  • -
  • Dener M., Bay, Ö. F., “Medium Access Control
  • Protocols For Wireless Sensor Networks:
  • Literature Survey”, G U J Sci, Cilt 25, No 2,
  • -464,2012.
  • Solehria, S. F., Jadoon, S., “Medium Access
  • Control Protocol for Wireless Sensor Networks:
  • a Survey”, IJVIPNS-IJENS, Cilt 11, No 3, 16-
  • , 2011.
  • Gunn, M., Koo, S. G. K., “A Comparative Study
  • of Medium Access Control Protocols for
  • Wireless Sensor Networks”, IJCNS, 695-703,
  • -
  • Yadav, R., Varma, S., Malaviya, N., “A Survey
  • of Mac Protocols For Wireless Sensor
  • Networks”, UbiCC Journal, Cilt 4, No 3, 827-
  • , 2009.
  • Kurose, J. F., Ross, K. W., “Computer
  • Networking: A Top-Down Approach Featuring
  • the Internet”, Addison Wesley, 2005.
  • Ray, S., Demirkol, I., Heinzelman, W., “ADVMAC:
  • Analysis and optimization of energy
  • efficiency through data advertisements for
  • wireless sensor networks”, Ad Hoc Networks,
  • Cilt 9, 876-892, 2011.
  • IEEE, IEEE Standard 802.11, Wireless LAN
  • Medium Access Control (MAC) and Physical Layer (PHY) Specifications, LAN MAN
  • Standards Committee of the IEEE Computer
  • Society, 1999.
  • Ali, M., Saif, U., Dunkels, A., Voigt, T., Römer,
  • K., Langendoen, K., Polastre, J., Uzmi, Z. A.,
  • “Medium access control issues in sensor
  • networks”, ACM SIGCOMM, Cilt 3, 3-36,
  • -
  • Kuntz, R., Gallais, A., Noel, T., “From
  • versatility to auto-adaptation of the medium
  • access control in wireless sensor networks”,
  • Journal of Parallel and Distributed
  • Computing, Cilt 71, 1236-1248, 2011.
  • Pham, H., Jha, S., “Addressing mobility in
  • wireless sensor media access control protocol”,
  • Networks and Information Processing, 113-
  • , 2004.
  • Sohrabi, K., Gao, J., Ailawadhi, V., Pottie, G.J.,
  • “Protocols for self-organization of a wireless
  • sensor network”, IEEE Personal
  • Communications, Cilt 7, No 5, 16–27, 2000.
  • Tilak, S., Abu-Ghazaleh, N., Heinzelman, W.,
  • “A taxonomy of wireless micro-sensor network
  • models”, ACM Mobile Computing and
  • Communications Review, Cilt 6, No 2, 28–36,
  • -
  • Giordano, V., Ballal, P., Lewis, F., Turchiano,
  • B., Zhang, J. B., “Supervisory Control of Mobile
  • Sensor Networks: Math Formulation,
  • Simulation, and Implementation”, IEEE
  • Transactions On Systems, Man, And
  • Cybernetics—Part B: Cybernetics, Cilt 36, No
  • , 806-819, 2006.
  • Boyle, D., Newe, T., “Securing Wireless Sensor
  • Networks: Security Architectures”, Journal of
  • Networks, Cilt 3, No 1, 65-77, 2008.
  • Akyildiz, I. F., Su, W., Sankarasubramaniam,
  • Y., Cayirci, E., “A survey on sensor Networks”,
  • IEEE Communications Magazine, Cilt 40, No
  • , 102-114, 2002.
  • Ng, H. S., Sim, M. L., Tan, C. M., “Security
  • issues of wireless sensor networks in healthcare
  • applications”, BT Technology Journal, Cilt 24,
  • No 2, 138–144, 2006.
  • IEEE, 802.11: Wireless LAN Medium Access
  • Control (MAC) and Physical Layer (PHY)
  • Specifications, IEEE Standard, 1999.
  • Kim, J., Park, K. H., “An energy-efficient,
  • transport-controlled MAC protocol for wireless
  • sensor networks”, Computer Networks, Cilt 53,
  • No 11, 1879-1902, 2009.
  • Dam, T., Langendoen, K., “An adaptive energyefficient
  • MAC protocol for wireless sensor
  • networks”, International Conference on
  • Embedded Networked Sensor Systems, 171-
  • , 2003.
  • Rajendran, V., Obraczka, K., Garcia-Luna-
  • Aceves, J., “Energy-efficient, collision-free
  • medium access control for wireless sensor
  • networks”, Proceedings of the International Conference on Embedded Networked Sensor
  • Systems (SenSys), 181–192, 2003.
  • Enz, C. C., El-Hoiydi, A., Decotignie, J-D.,
  • Peiris, V., “WiseNET: An Ultralow-Power
  • Wireless Sensor Network Solution”, IEEE
  • Computer, Cilt 37, No 8, 62-70, 2004.
  • El-Hoiydi, A., “Spatial TDMA and CSMA with
  • preamble sampling for low power ad hoc
  • wireless sensor networks”, Proceedings of
  • ISCC 2002, Seventh International Symposium
  • on Computers and Communications, 685 –
  • , 2002.
  • Polastre, J., Hill, J., Culler, D., “Versatile low
  • Power Media Access for Wireless Sensor
  • Networks”, Proceedings of the 2nd ACM
  • Conference on Embedded Networked Sensor
  • Systems (SenSys’04), 95-107, 2004.
  • El-Hoiydi, A., “Aloha with Preamble Sampling
  • for Sporadic Traffic in Ad-hoc Wireless Sensor
  • Networks”, IEEE International Conference on
  • Communications, 2002.
  • Jose, A. V., Khanna, N., Krishna, A. K.,
  • “Advanced Sensor MAC protocol to support
  • applications having different priority levels in
  • Wireless Sensor Networks”, 6th International
  • ICST Conference on Communications and
  • Networking, 340- 343, 2011.
  • Gong, H., Liu, M., Mao, Y., Chen, L., Xie, L.,
  • “Traffic Adaptive MAC Protocol for Wireless
  • Sensor Networks”, In Proceedings of
  • ICCNMC’05, 1134-1143, 2005.
  • Çakıroğlu, M., Özcerit, A.T., “Kablosuz
  • Algılayıcı Ağlarda Hizmet Engelleme
  • Saldırılarına Dayanıklı Ortam Erişim Protokolü
  • Tasarımı”, Gazi Üniv. Müh. Mim. Fak. Der.,
  • Cilt 22, No 4, 697-707, 2007.
  • Ren, Q., Liang, Q., “Fuzzy Logic-Optimized
  • Secure Media Access Control (FSMAC)
  • Protocol for Wireless Sensor Networks”, IEEE
  • Computational Intelligence for Homeland
  • Security and Personal Safety, 37-43, 2005
  • Kleinrock, L., Tobagi, F. A., “Packet switching
  • in radio channels: Part I—Carrier sense
  • multiple-access modes and their throughputdelay
  • characteristics”, IEEE Transactions on
  • Communications, Cilt 23, No 12, 1400–1416,
  • -
  • Perrig A., Szewczyk, R., Wen, V., Culler, D.,
  • Tygar, J. D., “SPINS: Security Protocols for
  • Sensor Networks”, Wireless Networks, Cilt 8,
  • -534, 2002.
  • Karlof, C., Sastry, N., ve Wagner, D., “TinySec:
  • A Link Layer Security Architecture for Wireless
  • Sensor Networks”, In Second ACM
  • Conference on Embedded Networked Sensor
  • Systems, 162-175, 2004.
  • Sultana, N., Ahmed, T., Hossain, S., “Study of a
  • new link layer Security scheme in a wireless
  • sensor network”, AIUB Journal of Science and Engineering (AJSE), Cilt 10, No 1, 79-86,
  • -
  • Luk, M., Mezzour, G., Perrig, A., Gligor. V.,
  • “MiniSec: Secure Sensor Network
  • Communication architecture”, In Proc. of the
  • th Int’l Conf. on Information Processinng in
  • Sensor Networks, 479-488, 2007.
  • Hsueh, C. T., Wen, C. Y., Ouyang, Y. C., "A
  • Secure scheme for power exhausting attacks in
  • wireless sensor networks", Ubiquitous and Future Networks (ICUFN), 2011 Third
  • International Conference on, Cilt 15, No 17,
  • -263, 2011.
  • ZigBee Alliance. Zigbee specication. Technical
  • Report Document 053474r06, Version 1.0,
  • ZigBee Alliance, 2005.
  • Krontiris, I., Dimitriou T., Soroush, H.,
  • Salajeghe, M., “WSN Link-layer Security
  • Frameworks” Athens I.