Repository logoGCRIS
  • English
  • Türkçe
  • Русский
Log In
New user? Click here to register. Have you forgotten your password?
Home
Communities
Browse GCRIS
Entities
Overview
GCRIS Guide
  1. Home
  2. Browse by Author

Browsing by Author "Dalkilic M.E."

Filter results by typing the first few letters
Now showing 1 - 3 of 3
  • Results Per Page
  • Sort Options
  • Loading...
    Thumbnail Image
    Conference Object
    A 2-Hop Coloring-Based Collision Free Infrastructure Design for Wireless Sensor Networks
    (Institute of Electrical and Electronics Engineers Inc., 2016) Korkmaz I.; Dagdeviren O.; Dalkilic M.E.
    This paper mainly proposes a design for a communication infrastructure for Wireless Sensor Networks. The proposed design prevents message collisions by arranging the time schedules to send, receive, forward and overhear packets of the nodes considering 2-hop graph coloring mechanism. The system aims to exclude the compromised nodes in the network using the overhearing mechanism, and copes with recovering the paths of the legitimate nodes using multipath redundancy. The proposed scheduling-based and overhearing supported infrastructure brings the advantage of providing the Sensor Networks with both reliable communication using backup paths and energy conservation by preventing the collisions. © 2016 IEEE.
  • Loading...
    Thumbnail Image
    Book Part
    Citation - Scopus: 2
    A Survey on Security in Wireless Sensor Networks: Attacks and Defense Mechanisms
    (IGI Global, 2013) Korkmaz I.; Dagdeviren O.; Tekbacak F.; Dalkilic M.E.
    Wireless Sensor Network (WSN) is a promising technology that has attracted the interest of research in the last decade. Security is one of the fundamental issues in sensor networks since sensor nodes are very resource constrained. An attacker may modify, insert, and delete new hardware and software components to the system where a single node, a specific part of the sensing area, and the whole network may become inoperable. Thus, the design of early attack detection and defense mechanisms must be carefully considered. In this chapter, the authors survey attacks and their defense mechanisms in WSNs. Attacks are categorized according to the related protocol layer. They also investigate the open research issues and emerging technologies on security in WSNs.
  • Loading...
    Thumbnail Image
    Conference Object
    Citation - Scopus: 3
    The Weak and the Strong Password Preferences: a Case Study on Turkish Users
    (2010) Korkmaz I.; Dalkilic M.E.
    Considering the computer authentication, any password shall not only be private to its owner but also be chosen as not to be predicted easily by others. The passwords used in authentication processes of any critical system should be strong as not to be cracked easily. In this context, the strong password choice gets significance for the general system security. This study aims to reveal the proper and improper properties on password preferences via examining the real samples. The method used in this work is first to gather the real passwords in plaintext, then to crack the encrypted forms of them and finally to investigate statistical queries on those passwords in order to distinguish the common weak and strong characteristics As the case study, the experiments are conducted on real passwords of Turkish users in an actively running system. The results of the experiments are categorized for weak and strong passwords. Moreover, the common tendencies on password choice are evaluated. Copyright 2010 ACM.
Repository logo
Collections
  • Scopus Collection
  • WoS Collection
  • TrDizin Collection
  • PubMed Collection
Entities
  • Research Outputs
  • Organizations
  • Researchers
  • Projects
  • Awards
  • Equipments
  • Events
About
  • Contact
  • GCRIS
  • Research Ecosystems
  • Feedback
  • OAI-PMH

Log in to GCRIS Dashboard

GCRIS Mobile

Download GCRIS Mobile on the App StoreGet GCRIS Mobile on Google Play

Powered by Research Ecosystems

  • Privacy policy
  • End User Agreement
  • Feedback