KABLOSUZ ALGILAYICI AĞLARDA ORTAM ERİŞİM PROTOKOLLERİ

Kablosuz Algılayıcı Ağlar (KAA) son yıllarda hızla gelişen ve araştırmacıların üzerinde çalıştığı konulardan biridir. Çok geniş bir kullanım alanı olan KAAlar, askeri, sağlık, kimyasal, çevresel, endüstri alanlarında kullanılabilmekte ve saptama, iz sürme, gözlemleme gibi işlevleri yapabilmektedirler. KAAlardaki en büyük problemlerden birisi ağda bulunan algılayıcıların kısıtlı kaynaklara sahip olmalarıdır. Sınırlı kaynakların başında da batarya ömrü gelmektedir. Literatürde algılayıcıların yaşam süresini artıracak (batarya ömrünü uzatacak) birçok çalışma yapılmıştır. Ayrıca KAAların günümüzde hareketli düğümler içermeleri ve askeri uygulamalar gibi güvenliğin önemli olduğu alanlarda kullanılmaları sebebiyle hareketlilik ve güvenlik de KAAlarda üzerinde durulan diğer önemli başlıklar haline gelmiştir. KAAlarda iletim ortamına erişim problemi bahsedilen üç konuyu da doğrudan etkilemektedir ve bu nedenle literatürde ortam erişim protokolleri üzerine birçok araştırma bulunmaktadır. Bu çalışmada KAAlarda kullanılan ortam erişim protokolleri incelenmiş ve enerji etkinliği, hareketlilik ve güvenlik açısından değerlendirilmiştir.

MEDIUM ACCESS CONTROL PROTOCOLS IN WIRELESS SENSOR NETWORKS

The recent development of Wireless Sensor Networks (WSN) is created a hot research area that attracts many researchers. WSNs have a wide range of application areas including military, chemical, environmental and industry fields. These networks can be used for applications such as surveillance, target detection and tracking. One of the biggest problems of WSN is that sensor nodes have strictly limited resources. The main limited resource is the battery life. In the literature, many studies have been conducted to increase the lifetime of sensor nodes (i.e., extend the battery life). Due to availability of mobile nodes and mission critical applications of WSNs, mobility and security are other important issues in WSNs. Problem of shared medium access is directly related to these issues and hence there are several studies on medium access protocols in the literature. In this study, medium access protocols of WSNs are examined and evaluated with respect to energy efficiency, mobility and security.

___

  • 1. Misra, S., Vaish, A., “Reputation-based role assignment for role-based access control in wireless sensor networks”, Computer Communications, Cilt 34, 281–294, 2011.
  • 2. Yick, J., Mukherjee, B., Ghosal, D., “Wireless sensor network survey”, Computer Networks, Cilt 52, 2292–2330, 2008.
  • 3. Sabbah, E., Kang, K. D., “Guide to Wireless Sensor Network”, Springer London, 489-490 2009.
  • 4. Kulkarni, R.V., Venayagamoorth, G. K., “Neural Network Based Secure Media Access Control Protocol for Wireless Sensor Network”, Proceedings of International Joint Conference on Neural Networks, 14-19, 2009.
  • 5. Cano, C., Bellalta, B., Sfairopoulou, A., Oliver, M., “Low energy operation in WSNs: A survey of preamble sampling MAC protocols”, Computer Networks, Cilt 55, 3351-3363, 2011.
  • 6. Demirkol, I., Ersoy, C., Alagoz, F., “Mac protocols for wireless sensor networks: a survey”, IEEE Communications Magazine, Cilt 44, No 4, 115–121, 2006.
  • 7. Ye, W., Heidemann, J., Estrin, D., “An EnergyEfficient MAC Protocol for Wireless Sensor Networks”, IEEE INFOCOM, Cilt 2, 1567- 1576, 2002.
  • 8. Ali, M., Suleman, T., ve Uzmi, Z. A., “MMAC: A Mobility-Adaptive, Collision-Free MAC Protocol for Wireless Sensor Networks”, Proceedings 24th IEEE IPCCC’05, 401-407, 2005.
  • 9. Dener M., Bay, Ö. F., “Medium Access Control Protocols For Wireless Sensor Networks: Literature Survey”, G U J Sci, Cilt 25, No 2, 455-464,2012.
  • 10. Solehria, S. F., Jadoon, S., “Medium Access Control Protocol for Wireless Sensor Networks: a Survey”, IJVIPNS-IJENS, Cilt 11, No 3, 16- 21, 2011.
  • 11. Gunn, M., Koo, S. G. K., “A Comparative Study of Medium Access Control Protocols for Wireless Sensor Networks”, IJCNS, 695-703, 2009.
  • 12. Yadav, R., Varma, S., Malaviya, N., “A Survey of Mac Protocols For Wireless Sensor Networks”, UbiCC Journal, Cilt 4, No 3, 827- 833, 2009.
  • 13. Kurose, J. F., Ross, K. W., “Computer Networking: A Top-Down Approach Featuring the Internet”, Addison Wesley, 2005. 14. Ray, S., Demirkol, I., Heinzelman, W., “ADVMAC: Analysis and optimization of energy efficiency through data advertisements for wireless sensor networks”, Ad Hoc Networks, Cilt 9, 876-892, 2011.
  • 15. IEEE, IEEE Standard 802.11, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, LAN MAN Standards Committee of the IEEE Computer Society, 1999.
  • 16. Ali, M., Saif, U., Dunkels, A., Voigt, T., Römer, K., Langendoen, K., Polastre, J., Uzmi, Z. A., “Medium access control issues in sensor networks”, ACM SIGCOMM, Cilt 3, 3-36, 2006.
  • 17. Kuntz, R., Gallais, A., Noel, T., “From versatility to auto-adaptation of the medium access control in wireless sensor networks”, Journal of Parallel and Distributed Computing, Cilt 71, 1236-1248, 2011.
  • 18. Pham, H., Jha, S., “Addressing mobility in wireless sensor media access control protocol”, Networks and Information Processing, 113- 118, 2004.
  • 19. Sohrabi, K., Gao, J., Ailawadhi, V., Pottie, G.J., “Protocols for self-organization of a wireless sensor network”, IEEE Personal Communications, Cilt 7, No 5, 16–27, 2000.
  • 20. Tilak, S., Abu-Ghazaleh, N., Heinzelman, W., “A taxonomy of wireless micro-sensor network models”, ACM Mobile Computing and Communications Review, Cilt 6, No 2, 28–36, 2002.
  • 21. Giordano, V., Ballal, P., Lewis, F., Turchiano, B., Zhang, J. B., “Supervisory Control of Mobile Sensor Networks: Math Formulation, Simulation, and Implementation”, IEEE Transactions On Systems, Man, And Cybernetics—Part B: Cybernetics, Cilt 36, No 4, 806-819, 2006.
  • 22. Boyle, D., Newe, T., “Securing Wireless Sensor Networks: Security Architectures”, Journal of Networks, Cilt 3, No 1, 65-77, 2008.
  • 23. Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., Cayirci, E., “A survey on sensor Networks”, IEEE Communications Magazine, Cilt 40, No 8, 102-114, 2002.
  • 24. Ng, H. S., Sim, M. L., Tan, C. M., “Security issues of wireless sensor networks in healthcare applications”, BT Technology Journal, Cilt 24, No 2, 138–144, 2006.
  • 25. IEEE, 802.11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Standard, 1999.
  • 26. Kim, J., Park, K. H., “An energy-efficient, transport-controlled MAC protocol for wireless sensor networks”, Computer Networks, Cilt 53, No 11, 1879-1902, 2009.
  • 27. Dam, T., Langendoen, K., “An adaptive energyefficient MAC protocol for wireless sensor networks”, International Conference on Embedded Networked Sensor Systems, 171- 180, 2003.
  • 28. Rajendran, V., Obraczka, K., Garcia-LunaAceves, J., “Energy-efficient, collision-free medium access control for wireless sensor networks”, Proceedings of the International Conference on Embedded Networked Sensor Systems (SenSys), 181–192, 2003.
  • 29. Enz, C. C., El-Hoiydi, A., Decotignie, J-D., Peiris, V., “WiseNET: An Ultralow-Power Wireless Sensor Network Solution”, IEEE Computer, Cilt 37, No 8, 62-70, 2004.
  • 30. El-Hoiydi, A., “Spatial TDMA and CSMA with preamble sampling for low power ad hoc wireless sensor networks”, Proceedings of ISCC 2002, Seventh International Symposium on Computers and Communications, 685 – 692, 2002.
  • 31. Polastre, J., Hill, J., Culler, D., “Versatile low Power Media Access for Wireless Sensor Networks”, Proceedings of the 2nd ACM Conference on Embedded Networked Sensor Systems (SenSys’04), 95-107, 2004.
  • 32. El-Hoiydi, A., “Aloha with Preamble Sampling for Sporadic Traffic in Ad-hoc Wireless Sensor Networks”, IEEE International Conference on Communications, 2002.
  • 33. Jose, A. V., Khanna, N., Krishna, A. K., “Advanced Sensor MAC protocol to support applications having different priority levels in Wireless Sensor Networks”, 6th International ICST Conference on Communications and Networking, 340- 343, 2011.
  • 34. Gong, H., Liu, M., Mao, Y., Chen, L., Xie, L., “Traffic Adaptive MAC Protocol for Wireless Sensor Networks”, In Proceedings of ICCNMC’05, 1134-1143, 2005.
  • 35. Çakıroğlu, M., Özcerit, A.T., “Kablosuz Algılayıcı Ağlarda Hizmet Engelleme Saldırılarına Dayanıklı Ortam Erişim Protokolü Tasarımı”, Gazi Üniv. Müh. Mim. Fak. Der., Cilt 22, No 4, 697-707, 2007.
  • 36. Ren, Q., Liang, Q., “Fuzzy Logic-Optimized Secure Media Access Control (FSMAC) Protocol for Wireless Sensor Networks”, IEEE Computational Intelligence for Homeland Security and Personal Safety, 37-43, 2005
  • 37. Kleinrock, L., Tobagi, F. A., “Packet switching in radio channels: Part I—Carrier sense multiple-access modes and their throughputdelay characteristics”, IEEE Transactions on Communications, Cilt 23, No 12, 1400–1416, 1975.
  • 38. Perrig A., Szewczyk, R., Wen, V., Culler, D., Tygar, J. D., “SPINS: Security Protocols for Sensor Networks”, Wireless Networks, Cilt 8, 521-534, 2002.
  • 39. Karlof, C., Sastry, N., ve Wagner, D., “TinySec: A Link Layer Security Architecture for Wireless Sensor Networks”, In Second ACM Conference on Embedded Networked Sensor Systems, 162-175, 2004.
  • 40. Sultana, N., Ahmed, T., Hossain, S., “Study of a new link layer Security scheme in a wireless sensor network”, AIUB Journal of Science and Engineering (AJSE), Cilt 10, No 1, 79-86, 2011.
  • 41. Luk, M., Mezzour, G., Perrig, A., Gligor. V., “MiniSec: Secure Sensor Network Communication architecture”, In Proc. of the 6th Int’l Conf. on Information Processinng in Sensor Networks, 479-488, 2007.
  • 42. Hsueh, C. T., Wen, C. Y., Ouyang, Y. C., "A Secure scheme for power exhausting attacks in wireless sensor networks", Ubiquitous and Future Networks (ICUFN), 2011 Third International Conference on, Cilt 15, No 17, 258-263, 2011.
  • 43. ZigBee Alliance. Zigbee specication. Technical Report Document 053474r06, Version 1.0, ZigBee Alliance, 2005.
  • 44. Krontiris, I., Dimitriou T., Soroush, H., Salajeghe, M., “WSN Link-layer Security Frameworks” Athens I.