Ricardo Harrilal-Parchment, Isabela Fernandez Pujol, Kemal Akkaya
Performance Evaluation of Quantum-Resistant Open Fronthaul Communications in 5G Proceedings Article
In: IEEE INFOCOM 2023-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 1–6, IEEE, 2023.
Abstract | Links | BibTeX | Tags: IoT/Sensor Networks
@inproceedings{nokey,
title = {Performance Evaluation of Quantum-Resistant Open Fronthaul Communications in 5G},
author = {Ricardo Harrilal-Parchment and Isabela Fernandez Pujol and Kemal Akkaya},
url = {https://ieeexplore.ieee.org/abstract/document/10225821/},
year = {2023},
date = {2023-05-20},
booktitle = {IEEE INFOCOM 2023-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)},
pages = {1–6},
publisher = {IEEE},
school = {Florida International University},
abstract = {As 5G is offering new services that include improved security for its core functions, there is an effort to secure all domains in 5G, including control, data, and synchronization. This has turned the attention to 5G fronthaul communication security, which has not been considered crucial for past generations of cellular technologies. With overall information security efforts increasing preparation for the deployment of post-quantum cryptographic algorithms, there is also a need to assess the feasibility and overhead when such algorithms are considered for 5G Open Fronthaul communications between the radio heads in base stations and distributed units within the network. This is crucial for protocols such as eCPRI which has certain real-time requirements to meet. To this end, this paper first proposes an integrated security solution that combines IEEE 802.11AE (MACsec) along with a post-quantum-based EAP-TLS},
keywords = {IoT/Sensor Networks},
pubstate = {published},
tppubtype = {inproceedings}
}
Luis Puche Rondon, Leonardo Babun, Ahmet Aris, Kemal Akkaya, A Selcuk Uluagac
LGuard: Securing Enterprise-IoT Systems against Serial-Based Attacks via Proprietary Communication Buses Journal Article
In: Digital Threats: Research and Practice, vol. 4, iss. 1, no. 1, pp. 1–26, 2023.
Abstract | Links | BibTeX | Tags: IoT/Sensor Networks
@article{nokey,
title = {LGuard: Securing Enterprise-IoT Systems against Serial-Based Attacks via Proprietary Communication Buses},
author = {Luis Puche Rondon and Leonardo Babun and Ahmet Aris and Kemal Akkaya and A Selcuk Uluagac},
url = {https://dl.acm.org/doi/abs/10.1145/3555721},
year = {2023},
date = {2023-03-07},
journal = {Digital Threats: Research and Practice},
volume = {4},
number = {1},
issue = {1},
pages = {1–26},
publisher = {ACM},
school = {Florida International University},
abstract = {Enterprise Internet of Things (E-IoT) systems allow users to control audio, video, scheduled events, lightning fixtures, door access, and relays in complex smart installations. These systems are widely used in government or smart private offices, smart buildings/homes, conference rooms, schools, hotels, and similar professional settings. However, even with their widespread use, the security of many E-IoT systems and components has not been researched in the literature. To address this research gap, we focus on E-IoT communication buses, one of the core components used to connect E-IoT devices, and introduce LightningStrike attacks that demonstrate several weaknesses with E-IoT proprietary communication protocols used in E-IoT communication buses. Specifically, we show that popular E-IoT proprietary communication protocols are susceptible to Denial-of-Service (DoS), eavesdropping, impersonation, and},
keywords = {IoT/Sensor Networks},
pubstate = {published},
tppubtype = {article}
}
Jessica Bozhko, Yacoub Hanna, Ricardo Harrilal-Parchment, Samet Tonyali, Kemal Akkaya
Performance Evaluation of Quantum-Resistant TLS for Consumer IoT Devices Proceedings Article
In: 2023 IEEE 20th Consumer Communications & Networking Conference (CCNC), pp. 230–235, IEEE, 2023.
Abstract | Links | BibTeX | Tags: IoT/Sensor Networks
@inproceedings{nokey,
title = {Performance Evaluation of Quantum-Resistant TLS for Consumer IoT Devices},
author = {Jessica Bozhko and Yacoub Hanna and Ricardo Harrilal-Parchment and Samet Tonyali and Kemal Akkaya},
url = {https://ieeexplore.ieee.org/abstract/document/10060762/},
year = {2023},
date = {2023-01-08},
booktitle = {2023 IEEE 20th Consumer Communications & Networking Conference (CCNC)},
pages = {230–235},
publisher = {IEEE},
school = {Florida International University},
abstract = {Post-quantum (PQ) cryptographic algorithms are currently being developed to be able to resist attacks by quantum computers. The practical use of these algorithms for securing networks will depend on their computational and communication efficiency. In particular, this is critical for the security of wireless communications within the context of consumer IoT devices that may have limited computational power and depend on a constrained wireless bandwidth. To this end, there is a need to evaluate the performance of widely used application layer security standards such as transport layer security (TLS) to understand the use of the existing PQ algorithms that are being evaluated by NIST as a replacement to the current cryptographic algorithms. This paper focuses on two widely used IoT standards Bluetooth Low Energy (BLE) and WiFi to find out the optimal performing PQ algorithm for their security when used in end},
keywords = {IoT/Sensor Networks},
pubstate = {published},
tppubtype = {inproceedings}
}
Luis Puche Rondon, Leonardo Babun, Ahmet Aris, Kemal Akkaya, A Selcuk Uluagac
IVYCIDE: Smart Intrusion Detection System against E-IoT Driver Threats Proceedings Article
In: IEEE, 2022.
Abstract | Links | BibTeX | Tags: IoT/Sensor Networks
@inproceedings{nokey,
title = {IVYCIDE: Smart Intrusion Detection System against E-IoT Driver Threats},
author = {Luis Puche Rondon and Leonardo Babun and Ahmet Aris and Kemal Akkaya and A Selcuk Uluagac},
url = {https://ieeexplore.ieee.org/abstract/document/9849838/},
year = {2022},
date = {2022-08-04},
journal = {IEEE Internet of Things Journal},
publisher = {IEEE},
school = {Florida International University},
abstract = {The rise of Internet of Things (IoT) devices has led to the proliferation of smart environments worldwide. Although commodity IoT devices are employed by ordinary end users, complex environments, such as smart buildings, government, or private offices, or conference rooms require customized and highly reliable IoT solutions. Enterprise IoT (E-IoT) connect such environments to the Internet and are professionally managed solutions usually offered by dedicated vendors As E-IoT systems require specialized training, closed-source software, and proprietary equipment to deploy. In effect, E-IoT systems present an unprecedented, under-researched, and unexplored threat vector for an attacker. In this work, we focus on E-IoT drivers, software modules used to integrate devices into E-IoT systems, as an attack mechanism. We first present PoisonIvy, a series of generalized proof-of-concept attacks used to demonstrate},
keywords = {IoT/Sensor Networks},
pubstate = {published},
tppubtype = {inproceedings}
}
Luis Puche Rondon, Leonardo Babun, Ahmet Aris, Kemal Akkaya, A Selcuk Uluagac
Survey on enterprise Internet-of-Things systems (E-IoT): A security perspective Journal Article
In: Ad Hoc Networks, vol. 125, pp. 102728, 2022.
Abstract | Links | BibTeX | Tags: IoT/Sensor Networks
@article{nokey,
title = {Survey on enterprise Internet-of-Things systems (E-IoT): A security perspective},
author = {Luis Puche Rondon and Leonardo Babun and Ahmet Aris and Kemal Akkaya and A Selcuk Uluagac},
url = {https://www.sciencedirect.com/science/article/pii/S1570870521002171},
year = {2022},
date = {2022-02-01},
journal = {Ad Hoc Networks},
volume = {125},
pages = {102728},
publisher = {Elsevier},
school = {Florida International University},
abstract = {As technology becomes more widely available, millions of users worldwide have installed some form of smart device in their homes or workplaces. These devices are often off-the-shelf commodity systems, such as Google Home or Samsung SmartThings, that are installed by end-users looking to automate a small deployment. In contrast to these plug-and-play systems, purpose-built Enterprise Internet-of-Things (E-IoT) systems such as Crestron, Control4, RTI, Savant offer a smart solution for more sophisticated applications (e.g., complete lighting control, A/V management, security). In contrast to commodity systems, E-IoT systems are usually closed source, costly, require certified installers, and are overall more robust for their use cases. Due to this, E-IoT systems are often found in expensive smart homes, government and academic conference rooms, yachts, and smart private offices. However, while there has},
keywords = {IoT/Sensor Networks},
pubstate = {published},
tppubtype = {article}
}
Juan Leon, Yacoub Hanna, Kemal Akkaya
Development and evaluation of a publish/subscribe IoT data sharing model with LoRaWAN Journal Article
In: Open Journal of Internet Of Things (OJIOT), vol. 8, iss. 1, no. 1, pp. 7–19, 2022.
Abstract | Links | BibTeX | Tags: IoT/Sensor Networks
@article{nokey,
title = {Development and evaluation of a publish/subscribe IoT data sharing model with LoRaWAN},
author = {Juan Leon and Yacoub Hanna and Kemal Akkaya},
url = {https://www.ronpub.com/ojiot/ojiot_2022v8i1n02_leon.html},
year = {2022},
date = {2022-00-00},
journal = {Open Journal of Internet Of Things (OJIOT)},
volume = {8},
number = {1},
issue = {1},
pages = {7–19},
publisher = {RonPub},
school = {Florida International University},
abstract = {Publish/subscribe architectures are becoming very common for many IoT environments such as power grid, manufacturing and factory automation. In these architectures, many different communication standards and middleware can be supported to ensure interoperability. One of the widely used publish/subscribe protocol is MQTT where a broker acts among publishers and subscribers to relay data on certain topics. While MQTT can be easily setup on cloud environments to perform research experiments, its large-scale and quick deployment for IoT environments with a widely used wireless MAC layer protocol such as LoRaWAN has not been thoroughly tested. Therefore, in this paper we develop and present a simulation framework in NS-3 to offer MQTT-based on publish/subscribe architecture that can also support LoRaWAN communication standard. To this end, we utilize NS-3's LoRaWAN library and integrate it with a broker that connects to other types of publishers/subscribers. We enable unicast capability from the broker to LoRaWAN end-devices while supporting multiple topics at the broker. We tested several scenarios under this IoT architecture to demonstrate its feasibility while assessing the performance at scale.},
keywords = {IoT/Sensor Networks},
pubstate = {published},
tppubtype = {article}
}
Luis Puche Rondon, Leonardo Babun, Ahmet Aris, Kemal Akkaya, A Selcuk Uluagac
LightningStrike: (in) secure practices of E-IoT systems in the wild Journal Article
In: pp. 106–116, 2021.
Abstract | Links | BibTeX | Tags: IoT/Sensor Networks
@article{nokey,
title = {LightningStrike: (in) secure practices of E-IoT systems in the wild},
author = {Luis Puche Rondon and Leonardo Babun and Ahmet Aris and Kemal Akkaya and A Selcuk Uluagac},
url = {https://dl.acm.org/doi/abs/10.1145/3448300.3467830},
year = {2021},
date = {2021-06-28},
pages = {106–116},
school = {Florida International University},
abstract = {The widespread adoption of specialty smart ecosystems has changed the everyday lives of users. As a part of smart ecosystems, Enterprise Internet of Things (E-IoT) allows users to integrate and control more complex installations in comparison to off-the-shelf IoT systems. With E-IoT, users have a complete control of audio, video, scheduled events, lightning fixtures, shades, door access, and relays via available user interfaces. As such, these systems see widespread use in government or smart private offices, schools, smart buildings, professional conference rooms, hotels, smart homes, yachts, and similar professional settings. However, even with their widespread use, the security of many E-IoT systems has not been researched in the literature. Further, many E-IoT systems utilize proprietary communication protocols that rely mostly on security through obscurity, which has perhaps led many users to mistakenly},
keywords = {IoT/Sensor Networks},
pubstate = {published},
tppubtype = {article}
}
Luis Puche Rondon, Leonardo Babun, Ahmet Aris, Kemal Akkaya, A Selcuk Uluagac
Survey on Enterprise Internet-of-Things Systems (E-IoT): A Security Perspective Journal Article
In: arXiv e-prints, pp. arXiv: 2102.10695, 2021.
Abstract | Links | BibTeX | Tags: IoT/Sensor Networks
@article{nokey,
title = {Survey on Enterprise Internet-of-Things Systems (E-IoT): A Security Perspective},
author = {Luis Puche Rondon and Leonardo Babun and Ahmet Aris and Kemal Akkaya and A Selcuk Uluagac},
url = {https://ui.adsabs.harvard.edu/abs/2021arXiv210210695P/abstract},
year = {2021},
date = {2021-02-00},
journal = {arXiv e-prints},
pages = {arXiv: 2102.10695},
school = {Florida International University},
abstract = {As technology becomes more widely available, millions of users worldwide have installed some form of smart device in their homes or workplaces. These devices are often off-the-shelf commodity systems, such as Google Home or Samsung SmartThings, that are installed by end-users looking to automate a small deployment. In contrast to these" plug-and-play" systems, purpose-built Enterprise Internet-of-Things (E-IoT) systems such as Crestron, Control4, RTI, Savant offer a smart solution for more sophisticated applications (eg, complete lighting control, A/V management, security). In contrast to commodity systems, E-IoT systems are usually closed source, costly, require certified installers, and are overall more robust for their use cases. Due to this, E-IoT systems are often found in expensive smart homes, government and academic conference rooms, yachts, and smart private offices. However, while there has},
keywords = {IoT/Sensor Networks},
pubstate = {published},
tppubtype = {article}
}
Luis Puche Rondon, Leonardo Babun, Ahmet Aris, Kemal Akkaya, A Selcuk Uluagac
PoisonIvy: (In) secure Practices of Enterprise IoT Systems in Smart Buildings Journal Article
In: pp. 130–139, 2020.
Abstract | Links | BibTeX | Tags: IoT/Sensor Networks
@article{nokey,
title = {PoisonIvy: (In) secure Practices of Enterprise IoT Systems in Smart Buildings},
author = {Luis Puche Rondon and Leonardo Babun and Ahmet Aris and Kemal Akkaya and A Selcuk Uluagac},
url = {https://dl.acm.org/doi/abs/10.1145/3408308.3427606},
year = {2020},
date = {2020-11-18},
pages = {130–139},
school = {Florida International University},
abstract = {The rise of IoT devices has led to the proliferation of smart buildings, offices, and homes worldwide. Although commodity IoT devices are employed by ordinary end-users, complex environments such as smart buildings, government, or private smart offices, conference rooms, or hospitality require customized and highly reliable solutions. Those systems called Enterprise Internet of Things (EIoT) connect such environments to the Internet and are professionally managed solutions usually offered by dedicated vendors (e.g., Control4, Crestron, Lutron, etc.). As EIoT systems require specialized training, software, and equipment to deploy, many of these systems are closed-source and proprietary in nature. This has led to very little research investigating the security of EIoT systems and their components. In effect, EIoT systems in smart settings such as smart buildings present an unprecedented and unexplored threat},
keywords = {IoT/Sensor Networks},
pubstate = {published},
tppubtype = {article}
}
Suat Mercan, Kemal Akkaya, Lisa Cain, John Thomas
Security, privacy and ethical concerns of IoT implementations in hospitality domain Proceedings Article
In: pp. 198–203, IEEE, 2020.
Abstract | Links | BibTeX | Tags: IoT/Sensor Networks
@inproceedings{nokey,
title = {Security, privacy and ethical concerns of IoT implementations in hospitality domain},
author = {Suat Mercan and Kemal Akkaya and Lisa Cain and John Thomas},
url = {https://ieeexplore.ieee.org/abstract/document/9291524/},
year = {2020},
date = {2020-11-02},
pages = {198–203},
publisher = {IEEE},
school = {Florida International University},
abstract = {The Internet of Things (IoT) has been on the rise in the last decade as it finds applications in various domains. Hospitality is one of the pioneer sectors that has adopted this technology to create novel services such as smart hotel rooms, personalized services etc. Hotels, restaurants, theme parks, and cruise ships are some specific application areas to improve customer satisfaction by creating an intense interactive environment and data collection with the use of appropriate sensors and actuators. However, applying IoT solutions in the hospitality environment has some unique challenges such as easy physical access to devices. In addition, due to the very nature of these domains, the customers are at the epicenter of these IoT technologies that result in a massive amount of data collection from them. Such data and its management along with business purposes also raises new concerns regarding privacy and ethical},
keywords = {IoT/Sensor Networks},
pubstate = {published},
tppubtype = {inproceedings}
}
Mohammad Ashiqur Rahman, Md Tauhidur Rahman, Mithat Kisacikoglu, Kemal Akkaya
Intrusion detection systems-enabled power electronics for unmanned aerial vehicles Proceedings Article
In: 2020 IEEE CyberPELS (CyberPELS), pp. 1–5, IEEE, 2020.
Abstract | Links | BibTeX | Tags: IoT/Sensor Networks
@inproceedings{nokey,
title = {Intrusion detection systems-enabled power electronics for unmanned aerial vehicles},
author = {Mohammad Ashiqur Rahman and Md Tauhidur Rahman and Mithat Kisacikoglu and Kemal Akkaya},
url = {https://ieeexplore.ieee.org/abstract/document/9311545/},
year = {2020},
date = {2020-10-13},
booktitle = {2020 IEEE CyberPELS (CyberPELS)},
pages = {1–5},
publisher = {IEEE},
school = {Florida International University},
abstract = {Compromised power electronics, due to firmware attacks and hardware Trojans, in a flight computer can jeopardize the safety and security of an Unmanned Aerial Vehicle (UAV). They can maliciously alter sensor measurements or control commands to make a UAV to take disastrous moves. Unfortunately, most of these attacks are difficult to detect before deploying components in the system. Therefore, detecting compromised behavior run-time is important, while it is challenging at the same time. In this work, we propose to build machine learning-based intrusion detection systems (IDSs) to be deployed at the power electronics/microcontorller level such that it can deal with malicious data/control commands initiated due to hardware attacks.},
keywords = {IoT/Sensor Networks},
pubstate = {published},
tppubtype = {inproceedings}
}
Luis Puche Rondon, Leonardo Babun, Ahmet Aris, Kemal Akkaya, A Selcuk Uluagac
PoisonIvy:(In) secure Practices of Enterprise IoT Systems in Smart Buildings Journal Article
In: arXiv e-prints, pp. arXiv: 2010.05658, 2020.
Abstract | Links | BibTeX | Tags: IoT/Sensor Networks
@article{nokey,
title = {PoisonIvy:(In) secure Practices of Enterprise IoT Systems in Smart Buildings},
author = {Luis Puche Rondon and Leonardo Babun and Ahmet Aris and Kemal Akkaya and A Selcuk Uluagac},
url = {https://ui.adsabs.harvard.edu/abs/2020arXiv201005658P/abstract},
year = {2020},
date = {2020-10-00},
journal = {arXiv e-prints},
pages = {arXiv: 2010.05658},
school = {Florida International University},
abstract = {The rise of IoT devices has led to the proliferation of smart buildings, offices, and homes worldwide. Although commodity IoT devices are employed by ordinary end-users, complex environments such as smart buildings, smart offices, conference rooms, or hospitality require customized and highly reliable solutions. Those systems called Enterprise Internet of Things (EIoT) connect such environments to the Internet and are professionally managed solutions usually offered by dedicated vendors. As EIoT systems require specialized training, software, and equipment to deploy, this has led to very little research investigating the security of EIoT systems and their components. In effect, EIoT systems in smart settings such as smart buildings present an unprecedented and unexplored threat vector for an attacker. In this work, we explore EIoT system vulnerabilities and insecure development practices. Specifically, focus on},
keywords = {IoT/Sensor Networks},
pubstate = {published},
tppubtype = {article}
}
Luis Puche Rondon, Leonardo Babun, Kemal Akkaya, A Selcuk Uluagac
HDMI-watch: Smart intrusion detection system against HDMI attacks Proceedings Article
In: pp. 2060–2072, IEEE, 2020.
Abstract | Links | BibTeX | Tags: IoT/Sensor Networks
@inproceedings{nokey,
title = {HDMI-watch: Smart intrusion detection system against HDMI attacks},
author = {Luis Puche Rondon and Leonardo Babun and Kemal Akkaya and A Selcuk Uluagac},
url = {https://ieeexplore.ieee.org/abstract/document/9180069/},
year = {2020},
date = {2020-08-28},
journal = {IEEE Transactions on Network Science and Engineering},
volume = {8},
number = {3},
issue = {3},
pages = {2060–2072},
publisher = {IEEE},
school = {Florida International University},
abstract = {The High Definition Multimedia Interface (HDMI) is the backbone and the de-facto standard for Audio/Video connections between video-enabled devices. Today, nearly ten billion HDMI devices are used to distribute A/V signals in homes, offices, concert halls, and sporting events. An important component in HDMI is the Consumer Electronics Control (CEC) protocol, which allows HDMI devices to share an HDMI distribution to communicate and interact with each other. In this work, we identify security and privacy issues in HDMI networks by taping into CEC protocol vulnerabilities, using them to implement realistic proof-of-work attacks on HDMI distribution networks. We study how current insecure CEC protocol practices and carelessly implemented HDMI distributions may grant an adversary a novel attack surface for HDMI devices, otherwise thought to be unreachable through traditional network means. We first},
keywords = {IoT/Sensor Networks},
pubstate = {published},
tppubtype = {inproceedings}
}
Leonardo Babun, Hidayet Aksu, Lucas Ryan, Kemal Akkaya, Elizabeth S Bentley, A Selcuk Uluagac
Z-iot: Passive device-class fingerprinting of zigbee and z-wave iot devices Proceedings Article
In: ICC 2020-2020 IEEE International Conference on Communications (ICC), pp. 1–7, IEEE, 2020.
Abstract | Links | BibTeX | Tags: IoT/Sensor Networks
@inproceedings{nokey,
title = {Z-iot: Passive device-class fingerprinting of zigbee and z-wave iot devices},
author = {Leonardo Babun and Hidayet Aksu and Lucas Ryan and Kemal Akkaya and Elizabeth S Bentley and A Selcuk Uluagac},
url = {https://ieeexplore.ieee.org/abstract/document/9149285/},
year = {2020},
date = {2020-06-07},
booktitle = {ICC 2020-2020 IEEE International Conference on Communications (ICC)},
pages = {1–7},
publisher = {IEEE},
school = {Florida International University},
abstract = {In addition to traditional networking devices (e.g., gateways, firewalls), current corporate and industrial networks integrate resource-limited Internet of Things (IoT) devices like smart outlets and smart sensors. In these settings, cyber attackers can bypass traditional security solutions and spoof legitimate IoT devices to gain illegal access to the systems. Thus, IoT device-class identification is crucial to protect critical networks from unauthorized access. In this paper, we propose Z-IoT, the first fingerprinting framework used to identify IoT device classes that utilize ZigBee and Z-Wave protocols. Z-IoT monitors idle network traffic among IoT devices to implement signature-based device-class fingerprinting mechanisms. Utilizing passive packet capturing techniques and optimal selection of filtering criteria and machine learning algorithms, Z-IoT identifies different types of IoT devices while guaranteeing the anonymity of the},
keywords = {IoT/Sensor Networks},
pubstate = {published},
tppubtype = {inproceedings}
}
Wesam Al Amiri, Mohamed Baza, Karim Banawan, Mohamed Mahmoud, Waleed Alasmary, Kemal Akkaya
Towards secure smart parking system using blockchain technology Proceedings Article
In: 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC), pp. 1–2, IEEE, 2020.
Abstract | Links | BibTeX | Tags: IoT/Sensor Networks
@inproceedings{nokey,
title = {Towards secure smart parking system using blockchain technology},
author = {Wesam Al Amiri and Mohamed Baza and Karim Banawan and Mohamed Mahmoud and Waleed Alasmary and Kemal Akkaya},
url = {https://ieeexplore.ieee.org/abstract/document/9045674/},
year = {2020},
date = {2020-01-10},
booktitle = {2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC)},
pages = {1–2},
publisher = {IEEE},
school = {Florida International University},
abstract = {Over the last few years, finding vacant parking spaces has become a hassle for drivers especially in crowded cities. This problem leads to wasting drivers' time, traffic congestion, and air pollution. Recently, smart parking systems aim to address this problem by enabling drivers to have real-time parking information about vacant parking spaces. However, the existing parking systems rely on a central third party to organize the service, which makes them subject to a single point of failure and privacy breach concerns by both internal and external attackers. In this paper, we propose a secure smart parking system using blockchain technology. Specifically, a consortium blockchain is made of parking lots to ensure security, transparency, and availability of the parking system. Then, to protect the drivers' location privacy, we use cloaking technique to hide the drivers' locations. The blockchain validators return available},
keywords = {IoT/Sensor Networks},
pubstate = {published},
tppubtype = {inproceedings}
}
Oscar Bautista, Kemal Akkaya, A Selcuk Uluagac
Internet of Things Journal Article
In: 2020.
Abstract | Links | BibTeX | Tags: IoT/Sensor Networks
@article{nokey,
title = {Internet of Things},
author = {Oscar Bautista and Kemal Akkaya and A Selcuk Uluagac},
url = {https://csl.fiu.edu/wp-content/uploads/2023/05/customized_oscar.pdf},
year = {2020},
date = {2020-00-00},
school = {Florida International University},
abstract = {With the proliferation of drones, there is an increasing interest on utilizing swarm-ofdrones in numerous applications from surveillance to search and rescue. While a swarmof-drones (aka flying ad hoc networks (FANETs)) is essentially a special form of mobile ad-hoc networks (MANETs) which has been studied for many years, there are unique requirements of drone applications that necessitate re-visiting MANET protocols. These challenges stem from 3-D environments the drones are deployed in, and their specific way of mobility which adds to the wireless link management challenges among the drones. To tackle these challenges, in this paper, we propose adopting the current mesh standard, namely IEEE 802.11 s, in its routing capabilities to provide improved performance. Specifically, we propose two new link quality routing metrics called SrFTime and CRP as an alternative to the IEEE 802.11 s default Airtime routing metric to meet network throughput requirements for FANET applications. Basically, SrFTime improves network performance of stationary FANETs, while CRP is designed to fit the transient link characteristics of mobile drones and enable more efficient routes from drones to their destinations. To be able to test these metrics, we also introduce a group mobility model adaptation for FANETs needs. The evaluations in the actual 802.11 s standard using ns-3 simulator and introduced 3-D mobility models indicate that our proposed metrics outperform the existing one consistently under various conditions.},
keywords = {IoT/Sensor Networks},
pubstate = {published},
tppubtype = {article}
}
Eyuphan Bulut, İsmail Güvenç, Kemal Akkaya
Privacy preserving distributed matching for device-to-device IoT communications: poster Journal Article
In: pp. 316–317, 2019.
Abstract | Links | BibTeX | Tags: IoT/Sensor Networks
@article{nokey,
title = {Privacy preserving distributed matching for device-to-device IoT communications: poster},
author = {Eyuphan Bulut and İsmail Güvenç and Kemal Akkaya},
url = {https://dl.acm.org/doi/abs/10.1145/3317549.3326309},
year = {2019},
date = {2019-05-15},
pages = {316–317},
school = {Florida International University},
abstract = {Device-to-device (D2D) communication enables machine-type devices (MTD) in Internet-of-Things (IoT) network communicate directly with each other and offload the cellular network. However, it may introduce interference as they share the same spectrum with the other devices that are directly connected to the base station. In this study, we look at the problem of assigning D2D communicating IoT pairs to the IoT devices that are directly connected to the base station such that the overall system throughput is not only maximized but also a stable matching is obtained. Different than previous work, we study many-to-one matching and propose a distributed privacy preserving stable matching process for efficient resource allocation without releasing location information.},
keywords = {IoT/Sensor Networks},
pubstate = {published},
tppubtype = {article}
}
Eyuphan Bulut, İsmail Güvenç, Kemal Akkaya
POSTER: Privacy Preserving Distributed Matching for Device-to-Device IoT Communications Journal Article
In: 2019.
Abstract | Links | BibTeX | Tags: IoT/Sensor Networks
@article{nokey,
title = {POSTER: Privacy Preserving Distributed Matching for Device-to-Device IoT Communications},
author = {Eyuphan Bulut and İsmail Güvenç and Kemal Akkaya},
url = {http://www.people.vcu.edu/~ebulut/wisec-2019.pdf},
year = {2019},
date = {2019-00-00},
school = {Florida International University},
abstract = {Device-to-device (D2D) communication enables machine-type devices (MTD) in Internet-of-Things (IoT) network communicate directly with each other and offload the cellular network. However, it may introduce interference as they share the same spectrum with the other devices that are directly connected to the base station. In this study, we look at the problem of assigning D2D communicating IoT pairs to the IoT devices that are directly connected to the base station such that the overall system throughput is not only maximized but also a stable matching is obtained. Different than previous work, we study many-to-one matching and propose a distributed privacy preserving stable matching process for efficient resource allocation without releasing location information.},
keywords = {IoT/Sensor Networks},
pubstate = {published},
tppubtype = {article}
}
Muhammad A Hakim, Hidayet Aksu, A Selcuk Uluagac, Kemal Akkaya
U-pot: A honeypot framework for upnp-based iot devices Proceedings Article
In: 2018 IEEE 37th International Performance Computing and Communications Conference (IPCCC), pp. 1–8, IEEE, 2018.
Abstract | Links | BibTeX | Tags: IoT/Sensor Networks
@inproceedings{nokey,
title = {U-pot: A honeypot framework for upnp-based iot devices},
author = {Muhammad A Hakim and Hidayet Aksu and A Selcuk Uluagac and Kemal Akkaya},
url = {https://ieeexplore.ieee.org/abstract/document/8711321/},
year = {2018},
date = {2018-11-17},
booktitle = {2018 IEEE 37th International Performance Computing and Communications Conference (IPCCC)},
pages = {1–8},
publisher = {IEEE},
school = {Florida International University},
abstract = {The ubiquitous nature of the IoT devices has brought serious security implications to its users. A lot of consumer IoT devices have little to no security implementation at all, thus risking user's privacy and making them target of mass cyber-attacks. Indeed, recent outbreak of Mirai botnet and its variants have already proved the lack of security on the IoT world. Hence, it is important to understand the security issues and attack vectors in the IoT domain. Though significant research has been done to secure traditional computing systems, little focus was given to the IoT realm. In this work, we reduce this gap by developing a honeypot framework for IoT devices. Specifically, we introduce U-PoT: a novel honeypot framework for capturing attacks on IoT devices that use Universal Plug and Play (UPnP) protocol. A myriad of smart home devices including smart switches, smart bulbs, surveillance cameras, smart hubs, etc. uses},
keywords = {IoT/Sensor Networks},
pubstate = {published},
tppubtype = {inproceedings}
}
Mumin Cebe, Berkay Kaplan, Kemal Akkaya
A network coding based information spreading approach for permissioned blockchain in IoT settings Journal Article
In: pp. 470–475, 2018.
Abstract | Links | BibTeX | Tags: IoT/Sensor Networks
@article{nokey,
title = {A network coding based information spreading approach for permissioned blockchain in IoT settings},
author = {Mumin Cebe and Berkay Kaplan and Kemal Akkaya},
url = {https://dl.acm.org/doi/abs/10.1145/3286978.3286984},
year = {2018},
date = {2018-11-05},
pages = {470–475},
school = {Florida International University},
abstract = {Permissioned Blockchain (PBC) has become a prevalent data structure to ensure that the records are immutable and secure. However, PBC still has significant challenges before it can be realized in different applications. One of such challenges is the overhead of the communication which is required to execute the Byzantine Agreement (BA) protocol that is needed for consensus building. As such, it may not be feasible to implement PBC for resource constrained environments such as Internet-of-Things (IoT). In this paper, we assess the communication overhead of running BA in an IoT environment that consists of wireless nodes (e.g., Raspberry PIs) with meshing capabilities. As the the packet loss ratio is significant and makes BA unfeasible to scale, we propose a network coding based approach that will reduce the packet overhead and minimize the consensus completion time of the BA. Specifically, various},
keywords = {IoT/Sensor Networks},
pubstate = {published},
tppubtype = {article}
}
Enes Erdin, Hidayet Aksu, Selcuk Uluagac, Micheal Vai, Kemal Akkaya
OS independent and hardware-assisted insider threat detection and prevention framework Proceedings Article
In: MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM), pp. 926–932, IEEE, 2018.
Abstract | Links | BibTeX | Tags: IoT/Sensor Networks
@inproceedings{nokey,
title = {OS independent and hardware-assisted insider threat detection and prevention framework},
author = {Enes Erdin and Hidayet Aksu and Selcuk Uluagac and Micheal Vai and Kemal Akkaya},
url = {https://ieeexplore.ieee.org/abstract/document/8599719/},
year = {2018},
date = {2018-10-29},
booktitle = {MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM)},
pages = {926–932},
publisher = {IEEE},
school = {Florida International University},
abstract = {Governmental and military institutions harbor critical infrastructure and highly confidential information. Although institutions are investing a lot for protecting their data and assets from possible outsider attacks, insiders are still a distrustful source for information leakage. As malicious software injection is one among many attacks, turning innocent employees into malicious attackers through social attacks is the most impactful one. Malicious insiders or uneducated employees are dangerous for organizations that they are already behind the perimeter protections that guard the digital assets; actually, they are trojans on their own. For an insider, the easiest possible way for creating a hole in security is using the popular and ubiquitous Universal Serial Bus (USB) devices due to its versatile and easy to use plug-and-play nature. USB type storage devices are the biggest threats for contaminating mission critical infrastructure},
keywords = {IoT/Sensor Networks},
pubstate = {published},
tppubtype = {inproceedings}
}
Amit Kumar Sikder, Abbas Acar, Hidayet Aksu, A Selcuk Uluagac, Kemal Akkaya, Mauro Conti
IoT-enabled smart lighting systems for smart cities Proceedings Article
In: 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), pp. 639–645, IEEE, 2018.
Abstract | Links | BibTeX | Tags: IoT/Sensor Networks
@inproceedings{nokey,
title = {IoT-enabled smart lighting systems for smart cities},
author = {Amit Kumar Sikder and Abbas Acar and Hidayet Aksu and A Selcuk Uluagac and Kemal Akkaya and Mauro Conti},
url = {https://ieeexplore.ieee.org/abstract/document/8301744/},
year = {2018},
date = {2018-01-08},
booktitle = {2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC)},
pages = {639–645},
publisher = {IEEE},
school = {Florida International University},
abstract = {Over the past few decades, the rate of urbanization has increased enormously. More enhanced services and applications are needed in urban areas to provide a better lifestyle. Smart city, which is a concept of interconnecting modern digital technologies in the context of a city, is a potential solution to enhance the quality and performance of urban services. With the introduction of Internet-of-Things (IoT) in the smart city, new opportunities have emerged to develop new services and integrate different application domains with each other using Information and Communication Technologies. However, to ensure seamless services in an IoT-enabled smart city environment, all the applications have to be maintained with limited energy resources. One of the core sectors that can be improved significantly by implementing IoT is the lighting system of a city since it consumes more energy than other parts of a city. In a smart},
keywords = {IoT/Sensor Networks},
pubstate = {published},
tppubtype = {inproceedings}
}
Kyle Denney, A Selcuk Uluagac, Hidayet Aksu, Kemal Akkaya
An Android-Based Covert Channel Framework on Wearables Using Status Bar Notifications Journal Article
In: Versatile Cybersecurity, pp. 1–17, 2018.
Abstract | Links | BibTeX | Tags: IoT/Sensor Networks
@article{nokey,
title = {An Android-Based Covert Channel Framework on Wearables Using Status Bar Notifications},
author = {Kyle Denney and A Selcuk Uluagac and Hidayet Aksu and Kemal Akkaya},
url = {https://link.springer.com/chapter/10.1007/978-3-319-97643-3_1},
year = {2018},
date = {2018-00-00},
journal = {Versatile Cybersecurity},
pages = {1–17},
publisher = {Springer International Publishing},
school = {Florida International University},
abstract = {Covert channels circumvent security measures to steal sensitive data undetectable to an onlooker. Traditionally, covert channels utilize global system resources or settings to send hidden messages. This chapter introduces covert channels and focuses on a novel covert channel on Android-based Internet of Things (IoT) devices. Particularly, we were able to make a covert channel using notifications a user gets from everyday applications. The chapter will also present this covert channel by discussing the framework, evaluating the performance, and demonstrating the functionality and flexibility of the proposed model.},
keywords = {IoT/Sensor Networks},
pubstate = {published},
tppubtype = {article}
}
Kyle Denney, A Selcuk Uluagac, Kemal Akkaya, Shekhar Bhansali
A novel storage covert channel on wearable devices using status bar notifications Proceedings Article
In: 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp. 845–848, IEEE, 2016.
Abstract | Links | BibTeX | Tags: IoT/Sensor Networks
@inproceedings{nokey,
title = {A novel storage covert channel on wearable devices using status bar notifications},
author = {Kyle Denney and A Selcuk Uluagac and Kemal Akkaya and Shekhar Bhansali},
url = {https://ieeexplore.ieee.org/abstract/document/7444898/},
year = {2016},
date = {2016-01-09},
booktitle = {2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)},
pages = {845–848},
publisher = {IEEE},
school = {Florida International University},
abstract = {Covert channels have been used as a means to circumvent security measures and send sensitive data undetectable to an onlooker. Many covert channels in Android systems have been documented utilizing various system resources or settings available to the entire system. Nonetheless, this paper introduces a new storage covert channel on the emerging field of wearables that sends data to other applications, or even to other nearby devices, through the use of notifications that are normally displayed on the status bar of an Android device. In this paper, we present the design of our ongoing work for this covert channel using Android-based wearable devices. Furthermore, we evaluate the performance of this covert channel using real equipment. Our evaluation demonstrates the functionality and feasibility of the proposed covert channel.},
keywords = {IoT/Sensor Networks},
pubstate = {published},
tppubtype = {inproceedings}
}
Selcuk Uluagac, Kemal Akkaya, Apurva Mohan, Mehmet H Cintuglu, Tarek Youssef, Osama Mohammed, Daniel Sullivan
Wireless Infrastructure in Industrial Control Systems Journal Article
In: Cyber-security of SCADA and Other Industrial Control Systems, pp. 29–49, 2016.
Abstract | Links | BibTeX | Tags: IoT/Sensor Networks
@article{nokey,
title = {Wireless Infrastructure in Industrial Control Systems},
author = {Selcuk Uluagac and Kemal Akkaya and Apurva Mohan and Mehmet H Cintuglu and Tarek Youssef and Osama Mohammed and Daniel Sullivan},
url = {https://link.springer.com/chapter/10.1007/978-3-319-32125-7_3},
year = {2016},
date = {2016-00-00},
journal = {Cyber-security of SCADA and Other Industrial Control Systems},
pages = {29–49},
publisher = {Springer International Publishing},
school = {Florida International University},
abstract = {The diverse components of an ICS discussed in the previous chapter must communicate with other components of the ICS. To do so, they are often connected within a wired communication architecture. Although wired connections render valuable reliable services to the infrastructure elements, nature or man-made disasters can damage the ICS wired communication infrastructure. It is just one of the reasons why wireless technologies are gradually gaining popularity in ICS architectures, especially as ICS systems undergoing extensive upgrade efforts in the last few years. Nevertheless, although wireless technologies (e.g., WLAN) are maturing and standardizing (NIST 2009) as viable solutions, they are not yet fully exploited as part of the massive upgrade efforts.},
keywords = {IoT/Sensor Networks},
pubstate = {published},
tppubtype = {article}
}
Erkay Uzun, Fatih Senel, Kemal Akkaya, Adnan Yazici
Distributed connectivity restoration in underwater acoustic sensor networks via depth adjustment Proceedings Article
In: 2015 IEEE International Conference on Communications (ICC), pp. 6357–6362, IEEE, 2015.
Abstract | Links | BibTeX | Tags: IoT/Sensor Networks
@inproceedings{nokey,
title = {Distributed connectivity restoration in underwater acoustic sensor networks via depth adjustment},
author = {Erkay Uzun and Fatih Senel and Kemal Akkaya and Adnan Yazici},
url = {https://ieeexplore.ieee.org/abstract/document/7249337/},
year = {2015},
date = {2015-06-08},
booktitle = {2015 IEEE International Conference on Communications (ICC)},
pages = {6357–6362},
publisher = {IEEE},
school = {Florida International University},
abstract = {In most applications of Underwater Acoustic Sensor Networks, network connectivity is required for data exchange, data aggregation and relaying the data to a surface station. However, such connectivity can be lost due to failure of some sensor nodes which creates disruptions to the network operations. In this paper, we present two algorithms, namely BMR and DURA, which can detect network partitioning due to such node failures and re-establish network connectivity through controlled depth adjustment of nodes in a distributed manner. The idea is to first identify whether the failure of each node will cause partitioning or not based on localized information. If partitioning is to occur as a result of the possible failure of a particular node, both BMR and DURA designates backup nodes to handle the recovery in the future. While DURA aims to localize the recovery process and minimize the movement overhead on the},
keywords = {IoT/Sensor Networks},
pubstate = {published},
tppubtype = {inproceedings}
}
Shadi Janansefat, Kemal Akkaya, Izzet F Senturk, Michael Gloff
Rethinking connectivity restoration in wsns using feedback from a low-cost mobile sensor network testbed Proceedings Article
In: 38th Annual IEEE Conference on Local Computer Networks-Workshops, pp. 108–115, IEEE, 2013.
Abstract | Links | BibTeX | Tags: IoT/Sensor Networks
@inproceedings{nokey,
title = {Rethinking connectivity restoration in wsns using feedback from a low-cost mobile sensor network testbed},
author = {Shadi Janansefat and Kemal Akkaya and Izzet F Senturk and Michael Gloff},
url = {https://ieeexplore.ieee.org/abstract/document/6758506/},
year = {2013},
date = {2013-10-21},
booktitle = {38th Annual IEEE Conference on Local Computer Networks-Workshops},
pages = {108–115},
publisher = {IEEE},
school = {Florida International University},
abstract = {In recent years, a lot of studies proposed to introduce mobility capability to sensor nodes in order to exploit the advantages of mobility in Wireless Sensor Networks (WSNs) applications. In particular, the idea has been exploited heavily to restore connectivity in disjoint WSNs. While the studies demonstrated various capabilities of the proposed connectivity algorithms via simulation, real node and testbed implementations were mostly lacking due to unavailability of proper hardware and/or high robot costs. Since this may hinder the direct applicability of the algorithms in realistic settings, testbeds which can be constructed with low-cost and commercial-off-the-shelf (COTS) hardware are required for realistic evaluations of the connectivity restoration algorithms. To this end, in this paper, we first design a low-cost mobile sensor network (MSN) testbed using iRobot-based mobile nodes. We integrate commercially available},
keywords = {IoT/Sensor Networks},
pubstate = {published},
tppubtype = {inproceedings}
}
Izzet F Senturk, Kemal Akkaya
Mobile data collector assignment and scheduling for minimizing data delay in partitioned wireless sensor networks Journal Article
In: pp. 15–31, 2013.
Abstract | Links | BibTeX | Tags: IoT/Sensor Networks
@article{nokey,
title = {Mobile data collector assignment and scheduling for minimizing data delay in partitioned wireless sensor networks},
author = {Izzet F Senturk and Kemal Akkaya},
url = {https://link.springer.com/chapter/10.1007/978-3-319-04105-6_2},
year = {2013},
date = {2013-10-16},
pages = {15–31},
publisher = {Springer International Publishing},
school = {Florida International University},
abstract = {Mobile Data Collectors (MDCs) can be employed to provide intermittent connectivity in partitioned Wireless Sensor Networks (WSNs). Typically, an MDC serves multiple partitions to collect their sensed data and relay it to the sink node if the sink is in one of the served partitions. If not, then the data needs to be passed to another MDC serving the sink partition at a certain rendezvous location. This causes an extra waiting time for the MDCs that reach the meeting points before others. In this paper, we propose a scheduling algorithm to reduce the rendezvous waiting delay based on the tour lengths. To completely eliminate this waiting delay, we also present a solution with multiple sinks. In this approach, the partitions of the WSN are clustered using -center optimization and Voronoi cells. An MDC is then assigned for touring each clusters partitions. In this way, the dependency of MDCs to relay their data to},
keywords = {IoT/Sensor Networks},
pubstate = {published},
tppubtype = {article}
}
Izzet F Senturk, Kemal Akkaya, Fatih Senel
An effective and scalable connectivity restoration heuristic for mobile sensor/actor networks Proceedings Article
In: 2012 IEEE Global Communications Conference (GLOBECOM), pp. 518–523, IEEE, 2012.
Abstract | Links | BibTeX | Tags: IoT/Sensor Networks
@inproceedings{nokey,
title = {An effective and scalable connectivity restoration heuristic for mobile sensor/actor networks},
author = {Izzet F Senturk and Kemal Akkaya and Fatih Senel},
url = {https://ieeexplore.ieee.org/abstract/document/6503165/},
year = {2012},
date = {2012-12-03},
booktitle = {2012 IEEE Global Communications Conference (GLOBECOM)},
pages = {518–523},
publisher = {IEEE},
school = {Florida International University},
abstract = {Due to inhospitable environments, the actors/sensors in Mobile Sensor/Actor Networks are subject to various damages which can disrupt the data delivery and cooperation. Typically, the damages affect the existing routes and may even cause network partitioning. In such a case, the set of actors/sensors disconnected from the rest of the network, namely a partition, can be re-connected with the network through topology adjustment by exploiting node mobility. However, movement of the nodes consumes significant energy which needs to be minimized. In this paper, we propose an effective yet scalable heuristic approach for restoring network connectivity while minimizing the total movement distance of the nodes. Given that the nodes can move to infinitely many locations in the damaged area, the basic motivation of the heuristic is to reduce the number of locations where the nodes can move. For this purpose, a},
keywords = {IoT/Sensor Networks},
pubstate = {published},
tppubtype = {inproceedings}
}
Izzet Senturk, Kemal Akkaya
Energy and terrain aware connectivity restoration in disjoint mobile sensor networks Proceedings Article
In: 37th Annual IEEE Conference on Local Computer Networks-Workshops, pp. 767–774, IEEE, 2012.
Abstract | Links | BibTeX | Tags: IoT/Sensor Networks
@inproceedings{nokey,
title = {Energy and terrain aware connectivity restoration in disjoint mobile sensor networks},
author = {Izzet Senturk and Kemal Akkaya},
url = {https://ieeexplore.ieee.org/abstract/document/6424062/},
year = {2012},
date = {2012-10-22},
booktitle = {37th Annual IEEE Conference on Local Computer Networks-Workshops},
pages = {767–774},
publisher = {IEEE},
school = {Florida International University},
abstract = {In Mobile Sensor Networks (MSNs), connectivity of the sensor nodes with the sink node can be disrupted due to failure of some nodes which may result network partitioning. To address this problem, mobility of the nodes has been exploited in the previous works so that an autonomous recovery can be achieved. All of these works have assumed reachability of the nodes to the selected destinations via a direct path movement. However, in real-world applications, such assumption makes the schemes impractical in case of encountering obstacles or intolerable terrains based on the kinematics of the mobile nodes. Besides, even if direct path movement is successful, optimal energy efficiency cannot be attained by neglecting the elevation or friction of the terrain when determining the movement path of the nodes. Thus, in the recovery efforts, terrain type, elevation as well as the obstacles should be taken into account in},
keywords = {IoT/Sensor Networks},
pubstate = {published},
tppubtype = {inproceedings}
}
Izzet F Senturk, Kemal Akkaya
On the performance of sensor node repositioning under realistic terrain constraints Proceedings Article
In: 37th Annual IEEE Conference on Local Computer Networks, pp. 336–339, IEEE, 2012.
Abstract | Links | BibTeX | Tags: IoT/Sensor Networks
@inproceedings{nokey,
title = {On the performance of sensor node repositioning under realistic terrain constraints},
author = {Izzet F Senturk and Kemal Akkaya},
url = {https://ieeexplore.ieee.org/abstract/document/6423643/},
year = {2012},
date = {2012-10-22},
booktitle = {37th Annual IEEE Conference on Local Computer Networks},
pages = {336–339},
publisher = {IEEE},
school = {Florida International University},
abstract = {Node mobility has been exploited in many context of Mobile Sensor Networks (MSNs) and Wireless Sensor and Actor Networks (WSANs) to improve network performance. In particular, network partitioning due to node failures has been addressed via repositioning of some of the mobile nodes. In all of these studies, the application terrain is assumed to be obstacle free and the movements are performed by following the direct path from the source to destination. However, in reality, this is not the case since the terrains would not be obstacle free and the nodes cannot move freely and smoothly to every requested location. The terrain type, elevation as well as the obstacles should be taken into account before the nodes start moving. In this paper, we claim that most of the existing approaches would either not work or produce wrong results if realistic assumptions regarding the terrain are not considered. To demonstrate},
keywords = {IoT/Sensor Networks},
pubstate = {published},
tppubtype = {inproceedings}
}
Izzet F Senturk, Sabri Yilmaz, Kemal Akkaya
A game-theoretic approach to connectivity restoration in wireless sensor and actor networks Proceedings Article
In: 2012 IEEE International Conference on Communications (ICC), pp. 7110–1714, IEEE, 2012.
Abstract | Links | BibTeX | Tags: IoT/Sensor Networks
@inproceedings{nokey,
title = {A game-theoretic approach to connectivity restoration in wireless sensor and actor networks},
author = {Izzet F Senturk and Sabri Yilmaz and Kemal Akkaya},
url = {https://ieeexplore.ieee.org/abstract/document/6364848/},
year = {2012},
date = {2012-06-10},
booktitle = {2012 IEEE International Conference on Communications (ICC)},
pages = {7110–1714},
publisher = {IEEE},
school = {Florida International University},
abstract = {Network partitioning can happen due to node failures in Wireless Sensor and Actor Networks (WSANs) that are deployed in inhospitable environments. In case of multiple actor damages, the network can be easily partitioned into several partitions which disrupt the communication among actors. In such a case, the nodes can relocate to re-establish the network connectivity. Such movement, however, should be minimized due to high energy cost for movement. In this paper, we tackle the problem of connectivity restoration in partitioned WSAN with minimized movement overhead by using a Game Theory based heuristic. The idea is based on the comparison of Nash equilibrium of the partitions. Specifically, the nodes staying in the partitions with greater equilibrium will be stationary while the nodes that are in partitions with the less equilibrium are relocated. In this way, partitions become a part of a federated partition},
keywords = {IoT/Sensor Networks},
pubstate = {published},
tppubtype = {inproceedings}
}
Izzet Senturk, Sabri Yilmaz, Kemal Akkaya
Connectivity restoration in delay–tolerant sensor networks using game theory Journal Article
In: International Journal of Ad Hoc and Ubiquitous Computing, vol. 11, iss. 2-3, no. 2-3, pp. 109–124, 2012.
Abstract | Links | BibTeX | Tags: IoT/Sensor Networks
@article{nokey,
title = {Connectivity restoration in delay–tolerant sensor networks using game theory},
author = {Izzet Senturk and Sabri Yilmaz and Kemal Akkaya},
url = {https://www.inderscienceonline.com/doi/abs/10.1504/IJAHUC.2012.050268},
year = {2012},
date = {2012-01-01},
journal = {International Journal of Ad Hoc and Ubiquitous Computing},
volume = {11},
number = {2-3},
issue = {2-3},
pages = {109–124},
publisher = {Inderscience Publishers},
school = {Florida International University},
abstract = {Due to limited resources and harsh environments, partitioning can be inevitable in wireless sensor networks (WSNs). To reestablish network connectivity, healthy mobile sensor nodes can be repositioned in an ondemand basis. However, the nodes are equipped with limited batteries and their movement requires excessive energy consumption. In this paper, we address the problem of minimising the movement cost when reestablishing network connectivity in delay tolerant WSNs by presenting a distributed heuristic approach based on Game Theory. Compared to centralised heuristics which assume complete knowledge of the network and failures, this approach is selfhealing that can work with uncertain network/failure information. Under limited knowledge on partitions and failure locations, Game Theory is used to facilitate decision making on the selection of the nodes to be moved and their movement},
keywords = {IoT/Sensor Networks},
pubstate = {published},
tppubtype = {article}
}
Shanthi Vemulapalli, Kemal Akkaya
Mobility-based self route recovery from multiple node failures in mobile sensor networks Proceedings Article
In: IEEE Local Computer Network Conference, pp. 699–706, IEEE, 2010.
Abstract | Links | BibTeX | Tags: IoT/Sensor Networks
@inproceedings{nokey,
title = {Mobility-based self route recovery from multiple node failures in mobile sensor networks},
author = {Shanthi Vemulapalli and Kemal Akkaya},
url = {https://ieeexplore.ieee.org/abstract/document/5735796/},
year = {2010},
date = {2010-10-10},
booktitle = {IEEE Local Computer Network Conference},
pages = {699–706},
publisher = {IEEE},
school = {Florida International University},
abstract = {In wireless sensor networks (WSNs), maintaining connectivity with the sink node is a crucial issue to collect data from sensors without any interruption. While sensors are typically deployed in abundance to tolerate possible node failures, a large number of such failures within the same region simultaneously may result in losing the connectivity with the sink node which eventually reduces the quality and efficiency of the network operation. Given that WSNs are deployed in inhospitable environments, such multiple node failures are very likely due to storms, fires, floods, etc. To recover from these multiple node failures, in this paper, we first present a local partition detection algorithm which makes the sensors aware of the damage and thus the partitioning in the network. We then utilize this information to recover the paths by exploiting sensor mobility. The idea is to locate the failed nodes by keeping complete routing},
keywords = {IoT/Sensor Networks},
pubstate = {published},
tppubtype = {inproceedings}
}
Yu Liu, Wei Zhang, Kemal Akkaya
Static worst-case energy and lifetime estimation of wireless sensor networks Proceedings Article
In: 2009 IEEE 28th International Performance Computing and Communications Conference, pp. 17–24, IEEE, 2009.
Abstract | Links | BibTeX | Tags: IoT/Sensor Networks
@inproceedings{nokey,
title = {Static worst-case energy and lifetime estimation of wireless sensor networks},
author = {Yu Liu and Wei Zhang and Kemal Akkaya},
url = {https://ieeexplore.ieee.org/abstract/document/5403808/},
year = {2009},
date = {2009-12-14},
booktitle = {2009 IEEE 28th International Performance Computing and Communications Conference},
pages = {17–24},
publisher = {IEEE},
school = {Florida International University},
abstract = {With the advance of computer and communication technologies, wireless sensor networks (WSNs) are increasingly used in many aspects of our daily life. However, since the battery lifetime of WSN nodes is restricted, the WSN lifetime is also limited. Therefore, it is crucial to determine this limited lifetime in advance for preventing service interruptions in critical applications. This paper proposes a feasible static analysis approach to estimate the worst-case lifetime of a WSN. Assuming known routes with a given sensor network topology and S-MAC as the underlying MAC protocol, we statically estimate the lifetime of each sensor node with a fixed initial energy budget. These estimations are then compared with the results obtained through simulation which run with the same energy budget on each node. Experimental results of our research on TinyOS applications indicate that our approach can safely and accurately},
keywords = {IoT/Sensor Networks},
pubstate = {published},
tppubtype = {inproceedings}
}
Kemal Akkaya, Fatih Senel
Detecting and connecting disjoint sub-networks in wireless sensor and actor networks Journal Article
In: Ad Hoc Networks, vol. 7, iss. 7, no. 7, pp. 1330–1346, 2009.
Abstract | Links | BibTeX | Tags: IoT/Sensor Networks
@article{nokey,
title = {Detecting and connecting disjoint sub-networks in wireless sensor and actor networks},
author = {Kemal Akkaya and Fatih Senel},
url = {https://www.sciencedirect.com/science/article/pii/S1570870509000055},
year = {2009},
date = {2009-09-01},
journal = {Ad Hoc Networks},
volume = {7},
number = {7},
issue = {7},
pages = {1330–1346},
publisher = {Elsevier},
school = {Florida International University},
abstract = {Wireless sensor and actor networks (WSANs) can be considered as a combination of a sensor network and an actor network in which powerful and mobile actor nodes can perform application specific actions based on the received data from the sensors. As most of these actions are performed collaboratively among the actors, inter-actor connectivity is one of the desirable features of WSANs. In this paper, we propose a novel distributed algorithm for establishing a connected inter-actor network topology. Considering initially disjoint sets of actors, our algorithm first initiates a search process by using the underlying sensor network in order to detect the possible sub-networks of actors in the region. After these sub-networks are detected, our algorithm pursues a coordinated actor movement in order to connect the sub-networks and thus achieve inter-actor connectivity for all the actors. This coordinated movement},
keywords = {IoT/Sensor Networks},
pubstate = {published},
tppubtype = {article}
}
Kemal Akkaya, Fatih Senel, Aravind Thimmapuram, Suleyman Uludag
Distributed recovery from network partitioning in movable sensor/actor networks via controlled mobility Proceedings Article
In: pp. 258–271, IEEE, 2009.
Abstract | Links | BibTeX | Tags: IoT/Sensor Networks
@inproceedings{nokey,
title = {Distributed recovery from network partitioning in movable sensor/actor networks via controlled mobility},
author = {Kemal Akkaya and Fatih Senel and Aravind Thimmapuram and Suleyman Uludag},
url = {https://ieeexplore.ieee.org/abstract/document/5184822/},
year = {2009},
date = {2009-07-31},
journal = {IEEE Transactions on Computers},
volume = {59},
number = {2},
issue = {2},
pages = {258–271},
publisher = {IEEE},
school = {Florida International University},
abstract = {Mobility has been introduced to sensor networks through the deployment of movable nodes. In movable wireless networks, network connectivity among the nodes is a crucial factor in order to relay data to the sink node, exchange data for collaboration, and perform data aggregation. However, such connectivity can be lost due to a failure of one or more nodes. Even a single node failure may partition the network, and thus, eventually reduce the quality and efficiency of the network operation. To handle this connectivity problem, we present PADRA to detect possible partitions, and then, restore the network connectivity through controlled relocation of movable nodes. The idea is to identify whether or not the failure of a node will cause partitioning in advance in a distributed manner. If a partitioning is to occur, PADRA designates a failure handler to initiate the connectivity restoration process. The overall goal in this},
keywords = {IoT/Sensor Networks},
pubstate = {published},
tppubtype = {inproceedings}
}
Ameer Abbasi, Uthman Baroudi, Mohamed Younis, Kemal Akkaya
C2AM: an algorithm for application-aware movement-assisted recovery in wireless sensor and actor networks Journal Article
In: pp. 655–659, 2009.
Abstract | Links | BibTeX | Tags: IoT/Sensor Networks
@article{nokey,
title = {C2AM: an algorithm for application-aware movement-assisted recovery in wireless sensor and actor networks},
author = {Ameer Abbasi and Uthman Baroudi and Mohamed Younis and Kemal Akkaya},
url = {https://dl.acm.org/doi/abs/10.1145/1582379.1582521},
year = {2009},
date = {2009-06-21},
pages = {655–659},
school = {Florida International University},
abstract = {In Wireless Sensor and Actor Networks (WSANs) a connected interactor topology is desirable in order for the deployed actors to work collaboratively. If a critical actor fails causing the inter-actor network to get partitioned into disjoint segments, the other actors close to the faulty node often exploit their mobility to autonomously restore the lost inter-actor connectivity. However, such a solution focuses on resource efficiency and assumes no constraints on the mobility of actors which can be impractical in the real scenarios. In addition, since actors need to carry out tasks to meet the application level requirements, unconstrained movement of actor(s) to restore interactor connectivity can cause a major failure at the application level. This paper presents C2AM; a recovery algorithm that factors in application level constraints on actor's mobility while restoring the network connectivity. In addition to considering physical level},
keywords = {IoT/Sensor Networks},
pubstate = {published},
tppubtype = {article}
}
Ameer A Abbasi, Mohamed Younis, Kemal Akkaya
Movement-assisted connectivity restoration in wireless sensor and actor networks Proceedings Article
In: pp. 1366–1379, IEEE, 2008.
Abstract | Links | BibTeX | Tags: IoT/Sensor Networks
@inproceedings{nokey,
title = {Movement-assisted connectivity restoration in wireless sensor and actor networks},
author = {Ameer A Abbasi and Mohamed Younis and Kemal Akkaya},
url = {https://ieeexplore.ieee.org/abstract/document/4689552/},
year = {2008},
date = {2008-11-25},
journal = {IEEE Transactions on parallel and distributed systems},
volume = {20},
number = {9},
issue = {9},
pages = {1366–1379},
publisher = {IEEE},
school = {Florida International University},
abstract = {Recent years have witnessed a growing interest in applications of wireless sensor and actor networks (WSANs). In these applications, a set of mobile actor nodes are deployed in addition to sensors in order to collect sensors' data and perform specific tasks in response to detected events/objects. In most scenarios, actors have to respond collectively, which requires interactor coordination. Therefore, maintaining a connected interactor network is critical to the effectiveness of WSANs. However, WSANs often operate unattended in harsh environments where actors can easily fail or get damaged. An actor failure may lead to partitioning the interactor network and thus hinder the fulfillment of the application requirements. In this paper, we present DARA, a distributed actor recovery algorithm, which opts to efficiently restore the connectivity of the interactor network that has been affected by the failure of an actor. Two},
keywords = {IoT/Sensor Networks},
pubstate = {published},
tppubtype = {inproceedings}
}
Kemal Akkaya, Aravind Thimmapuram, Fatih Senel, Suleyman Uludag
Distributed recovery of actor failures in wireless sensor and actor networks Proceedings Article
In: 2008 IEEE wireless communications and networking conference, pp. 2480–2485, IEEE, 2008.
Abstract | Links | BibTeX | Tags: IoT/Sensor Networks
@inproceedings{nokey,
title = {Distributed recovery of actor failures in wireless sensor and actor networks},
author = {Kemal Akkaya and Aravind Thimmapuram and Fatih Senel and Suleyman Uludag},
url = {https://ieeexplore.ieee.org/abstract/document/4489467/},
year = {2008},
date = {2008-03-31},
booktitle = {2008 IEEE wireless communications and networking conference},
pages = {2480–2485},
publisher = {IEEE},
school = {Florida International University},
abstract = {Wireless sensor and actor networks (WSANs) additionally employ actor nodes within the wireless sensor network (WSN) which can process the sensed data and perform certain actions based on this collected data. In most applications, inter-actor coordination is required to provide the best response. This suggests that the employed actors should form and maintain a connected inter-actor network at all times. However, WSANs often operate unattended in harsh environments where actors can easily fail or get damaged. Such failures can partition the inter-actor network and thus eventually make the network useless. In order to handle such failures, we present a connected dominating set (CDS) based partition detection and recovery algorithm. The idea is to identify whether the failure of a node causes partitioning or not in advance. If a partitioning is to occur, the algorithm designates one of the neighboring nodes to},
keywords = {IoT/Sensor Networks},
pubstate = {published},
tppubtype = {inproceedings}
}
Kemal Akkaya, Murat Demirbas, R Savas Aygun
The impact of data aggregation on the performance of wireless sensor networks Journal Article
In: Wireless Communications and Mobile Computing, vol. 8, iss. 2, no. 2, pp. 171–193, 2008.
Abstract | Links | BibTeX | Tags: IoT/Sensor Networks
@article{nokey,
title = {The impact of data aggregation on the performance of wireless sensor networks},
author = {Kemal Akkaya and Murat Demirbas and R Savas Aygun},
url = {https://onlinelibrary.wiley.com/doi/abs/10.1002/wcm.454},
year = {2008},
date = {2008-02-00},
journal = {Wireless Communications and Mobile Computing},
volume = {8},
number = {2},
issue = {2},
pages = {171–193},
publisher = {John Wiley & Sons, Ltd.},
school = {Florida International University},
abstract = {With the increasing need for different energy saving mechanisms in Wireless Sensor Networks (WSNs), data aggregation techniques for reducing the number of data transmissions by eliminating redundant information have been studied as a significant research problem. These studies have shown that data aggregation in WSNs may produce various tradeoffs among some network related performance metrics such as energy, latency, accuracy, faulttolerance and security. In this paper, we investigate the impact of data aggregation on these networking metrics by surveying the existing data aggregation protocols in WSNs. Our aim is twofold: First, providing a comprehensive summary and comparison of the existing data aggregation techniques with respect to different networking metrics. Second, pointing out both the possible future research issues and the need for collaboration between data management and},
keywords = {IoT/Sensor Networks},
pubstate = {published},
tppubtype = {article}
}
Fatih Senel, Kemal Akkaya, Mohamed Younis
An efficient mechanism for establishing connectivity in wireless sensor and actor networks Proceedings Article
In: IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, pp. 1129–1133, IEEE, 2007.
Abstract | Links | BibTeX | Tags: IoT/Sensor Networks
@inproceedings{nokey,
title = {An efficient mechanism for establishing connectivity in wireless sensor and actor networks},
author = {Fatih Senel and Kemal Akkaya and Mohamed Younis},
url = {https://ieeexplore.ieee.org/abstract/document/4411127/},
year = {2007},
date = {2007-11-26},
booktitle = {IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference},
pages = {1129–1133},
publisher = {IEEE},
school = {Florida International University},
abstract = {Wireless sensor and actor networks (WSANs) employ powerful and mobile actor nodes that can perform application specific actions based on the received data from the sensors. As most of these actions are performed collaboratively among the actors, inter-actor connectivity is one of the desirable features of WSANs. In this paper, we propose a novel distributed algorithm for establishing a connected inter-actor network topology. Considering an initially partitioned actor network with intra-connected sub-networks, our algorithm pursues a coordinated actor movement in order to connect the sub-networks. The goal of this movement is to both minimize the total and maximum travel distances of the individual actors. Our algorithm considers the minimum connected dominating set of each sub-network when picking the appropriate actor to move so that the connectivity of each sub-network is not violated. We analytically},
keywords = {IoT/Sensor Networks},
pubstate = {published},
tppubtype = {inproceedings}
}
Ameer Ahmed Abbasi, Kemal Akkaya, Mohamed Younis
A distributed connectivity restoration algorithm in wireless sensor and actor networks Proceedings Article
In: 32nd IEEE conference on local computer networks (LCN 2007), pp. 496–503, IEEE, 2007.
Abstract | Links | BibTeX | Tags: IoT/Sensor Networks
@inproceedings{nokey,
title = {A distributed connectivity restoration algorithm in wireless sensor and actor networks},
author = {Ameer Ahmed Abbasi and Kemal Akkaya and Mohamed Younis},
url = {https://ieeexplore.ieee.org/abstract/document/4367880/},
year = {2007},
date = {2007-10-15},
booktitle = {32nd IEEE conference on local computer networks (LCN 2007)},
pages = {496–503},
publisher = {IEEE},
school = {Florida International University},
abstract = {There has been an increased interest in applications of wireless sensor and actor networks (WSANs) in recent years. In such applications, a set of mobile actor nodes are deployed in addition to sensors in order to collect sensors' data and perform specific tasks in response to detected events/objects. In most scenarios actors have to respond collectively which requires an inter-actor coordination. Therefore, maintaining a connected inter-actor network is crucial to the effectiveness of WSANs. However, WSANs often operate unattended in harsh environments where actors can easily fail or get damaged. Due to such failures an actor will be unable to communicate with its neighbors which may lead to partitioning the inter-actor network. In this paper we present DARA; a Distributed Actor Recovery Algorithm, which opts to efficiently restore the connectivity of the inter-actor network that has been affected by the failure of},
keywords = {IoT/Sensor Networks},
pubstate = {published},
tppubtype = {inproceedings}
}
Brian McLaughlan, Kemal Akkaya
Coverage-based clustering of wireless sensor and actor networks Proceedings Article
In: IEEE international conference on pervasive services, pp. 45–54, IEEE, 2007.
Abstract | Links | BibTeX | Tags: IoT/Sensor Networks
@inproceedings{nokey,
title = {Coverage-based clustering of wireless sensor and actor networks},
author = {Brian McLaughlan and Kemal Akkaya},
url = {https://ieeexplore.ieee.org/abstract/document/4283888/},
year = {2007},
date = {2007-07-15},
booktitle = {IEEE international conference on pervasive services},
pages = {45–54},
publisher = {IEEE},
school = {Florida International University},
abstract = {In addition to the miniaturized sensor nodes, Wireless Sensor and Actor Networks (WSANs) employ significantly more capable actor nodes that can perform application specific actions to deal with events detected and reported by the sensors. Since these actions can be taken at any spot within the monitored region, the actors should strive to provide maximal coverage of the area. In addition, minimizing the time to decide which actor should take what action is of utmost important for responsiveness. In this paper, we propose a distributed actor positioning and clustering algorithm which employs actors as cluster-heads and places them in such a way that the coverage of actors is maximized and the data gathering and acting process times are minimized. Such placement of actors is done by determining the -hop Independent Dominating Set (IDS) of the underlying sensor network. The performance of the approach is},
keywords = {IoT/Sensor Networks},
pubstate = {published},
tppubtype = {inproceedings}
}
Waleed A Youssef, Mohamed F Younis, Kemal Akkaya
Improving gateway safety in wireless sensor networks using cognitive techniques Journal Article
In: International Journal of Sensor Networks, vol. 2, iss. 5-6, no. 5-6, pp. 331–340, 2007.
Abstract | Links | BibTeX | Tags: IoT/Sensor Networks
@article{nokey,
title = {Improving gateway safety in wireless sensor networks using cognitive techniques},
author = {Waleed A Youssef and Mohamed F Younis and Kemal Akkaya},
url = {https://www.inderscienceonline.com/doi/abs/10.1504/IJSNET.2007.014358},
year = {2007},
date = {2007-01-01},
journal = {International Journal of Sensor Networks},
volume = {2},
number = {5-6},
issue = {5-6},
pages = {331–340},
publisher = {Inderscience Publishers},
school = {Florida International University},
abstract = {In this paper, we present an innovative approach for gateway relocation in Wireless Sensor Networks (WSNs). We employ existing well-known artificial intelligence techniques to make smart gateway relocation based on many input factors from the environment. The gateway placement problem has been extensively researched. However, most of the proposed solutions are geared for boosting network-related performance metrics, such as throughput and energy consumption. The proposed approach for safe gateway relocation, named G-Safe, emphasises both increased protection of the gateway and improvements in overall network performance. We argue that relocating without taking safety concerns into consideration may cause the gateway to move dangerously close to one or multiple serious events in the environment. G-Safe utilises artificial neural networks to select the safest location accessible to the},
keywords = {IoT/Sensor Networks},
pubstate = {published},
tppubtype = {article}
}
Waleed Youssef, Mohamed Younis, Kemal Akkaya
An intelligent safety-aware gateway relocation scheme for wireless sensor networks Proceedings Article
In: 2006 IEEE International Conference on Communications, pp. 3396–3401, IEEE, 2006.
Abstract | Links | BibTeX | Tags: IoT/Sensor Networks
@inproceedings{nokey,
title = {An intelligent safety-aware gateway relocation scheme for wireless sensor networks},
author = {Waleed Youssef and Mohamed Younis and Kemal Akkaya},
url = {https://ieeexplore.ieee.org/abstract/document/4024998/},
year = {2006},
date = {2006-06-11},
booktitle = {2006 IEEE International Conference on Communications},
volume = {8},
pages = {3396–3401},
publisher = {IEEE},
school = {Florida International University},
abstract = {Recently, wireless sensor networks (WSN) have received enormous attentions due to their potential use in many applications. They can be used to enrich our understanding of natural events, such as earthquakes and volcanoes, and to increase the efficiency of surveillance operations in secure installation, border control and military reconnaissance. Sensors are placed in harsh environments to collect and deliver data to a central node, called the gateway. The gateway analyzes the received data and decides on appropriate actions. Therefore, protecting the gateway is critical for ensuring the robustness of WSN. Since the location of the gateway significantly affects the efficiency of the network operation, many research have been conducted for the gateway placement problem. However, most of the proposed solutions are geared for boosting network-related performance metrics, such as throughput and energy},
keywords = {IoT/Sensor Networks},
pubstate = {published},
tppubtype = {inproceedings}
}
Kemal Akkaya, Murat Demirbas, R Savas Aygun
The impact of data aggregation on the performance of wireless sensor networks: a survey Journal Article
In: Wiley Journal of Wireless Communications and Mobile Computing, vol. 10, 2006.
Abstract | Links | BibTeX | Tags: IoT/Sensor Networks
@article{nokey,
title = {The impact of data aggregation on the performance of wireless sensor networks: a survey},
author = {Kemal Akkaya and Murat Demirbas and R Savas Aygun},
url = {http://www.cs.uah.edu/~raygun/pubs/journals/2008_wcmc_akkaya_data_aggregation.pdf},
year = {2006},
date = {2006-00-00},
journal = {Wiley Journal of Wireless Communications and Mobile Computing},
volume = {10},
school = {Florida International University},
abstract = {With the increasing need for different energy saving mechanisms in Wireless Sensor Networks (WSNs), data aggregation techniques for reducing the number of data transmissions by eliminating redundant information have been studied as a significant research problem. These studies have shown that data aggregation in WSNs may produce various trade-offs among some network related performance metrics such as energy, latency, accuracy, fault-tolerance and security. In this paper, we investigate the impact of data aggregation on these networking metrics by surveying the existing data aggregation protocols in WSNs. Our aim is twofold: First, providing a comprehensive summary and comparison of the existing data aggregation techniques with respect to different networking metrics. Second, pointing out both the possible future research issues and the need for collaboration between data management and networking research communities working on data aggregation in WSNs.},
keywords = {IoT/Sensor Networks},
pubstate = {published},
tppubtype = {article}
}
Kemal Akkaya, Mohamed Younis
Relocation of gateway for enhanced timeliness in wireless sensor networks Proceedings Article
In: IEEE International Conference on Performance, Computing, and Communications, 2004, pp. 471–476, IEEE, 2004.
Abstract | Links | BibTeX | Tags: IoT/Sensor Networks
@inproceedings{nokey,
title = {Relocation of gateway for enhanced timeliness in wireless sensor networks},
author = {Kemal Akkaya and Mohamed Younis},
url = {https://ieeexplore.ieee.org/abstract/document/1395064/},
year = {2004},
date = {2004-04-15},
booktitle = {IEEE International Conference on Performance, Computing, and Communications, 2004},
pages = {471–476},
publisher = {IEEE},
school = {Florida International University},
abstract = {In recent years, due to increasing interest in applications of wireless sensor networks that demand certain quality of service (QoS) guarantees, new routing protocols have been proposed for providing energy-efficient real-time relaying of data. However, none of these protocols considered any possible movement of the sink node for performance purposes. In this paper, we propose possible relocation of sink (gateway) for improving the timeliness of real-time packets. Our approach searches for a location close to the most loaded node. The gateway is then relocated to the new location so that the load of that node is alleviated and the real-time traffic can be split. As long as the gateway stays within the transmission range of all last hop nodes, it can be moved to that location without affecting the current route setup. Otherwise routes are adjusted by introducing new forwarders. Simulation results demonstrate the},
keywords = {IoT/Sensor Networks},
pubstate = {published},
tppubtype = {inproceedings}
}
Mohamed Younis, Kemal Akkaya, Anugeetha Kunjithapatham
Optimization of task allocation in a cluster-based sensor network Proceedings Article
In: Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003, pp. 329–334, IEEE, 2003.
Abstract | Links | BibTeX | Tags: IoT/Sensor Networks
@inproceedings{nokey,
title = {Optimization of task allocation in a cluster-based sensor network},
author = {Mohamed Younis and Kemal Akkaya and Anugeetha Kunjithapatham},
url = {https://ieeexplore.ieee.org/abstract/document/1214141/},
year = {2003},
date = {2003-07-03},
booktitle = {Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003},
pages = {329–334},
publisher = {IEEE},
school = {Florida International University},
abstract = {Sensor networks have recently gained a lot of attention from the research community. Sensors are significantly resource-constrained devices and last till the depletion of their batteries. Sensor networks typically have a large number of nodes. To ensure scalability sensor networks are often partitioned into clusters, each managed by a cluster head (gateway). Efficient management of a sensor network for extending the lifetime of the network is among the prominent areas of research in this domain. While most of the previous research focused on the optimal use of sensor's energy, very little attention has been paid to the efficiency of energy usage at the gateway. Tasks need to be allocated to gateways in such a way that maximizes the life of these cluster-heads and eventually the whole network. In this paper, we present an optimization scheme for task allocation to gateways. The task allocation problem is modeled as},
keywords = {IoT/Sensor Networks},
pubstate = {published},
tppubtype = {inproceedings}
}
Citations: 18671
h-index: 54
i10-index: 162