32 research outputs found

    Relocating sensor nodes to maximize cumulative connected coverage in wireless sensor networks

    Get PDF
    PubMed ID: 27879850In order to extend the availability of the wireless sensor network and to extract maximum possible information from the surveillance area, proper usage of the power capacity of the sensor nodes is important. Our work describes a dynamic relocation algorithm called MaxNetLife, which is mainly based on utilizing the remaining power of individual sensor nodes as well as properly relocating sensor nodes so that all sensor nodes can transmit the data they sense to the sink. Hence, the algorithm maximizes total collected information from the surveillance area before the possible death of the sensor network by increasing cumulative connected coverage parameter of the network. A deterministic approach is used to deploy sensor nodes into the sensor field where Hexagonal Grid positioning is used to address and locate each sensor node. Sensor nodes those are not planned to be actively used in the close future in a specific cell are preemptively relocated to the cells those will be in need of additional sensor nodes to improve cumulative connected coverage of the network. MaxNetLife algorithm also includes the details of the relocation activities, which include preemptive migration of the redundant nodes to the cells before any coverage hole occurs because of death of a sensor node. Relocation Model, Data Aggregation Model, and Energy model of the algorithm are studied in detail. MaxNetLife algorithm is proved to be effective, scalable, and applicable through simulations.Publisher's Versio

    Quarantine region scheme to mitigate spam attacks in wireless sensor networks

    Get PDF
    The Quarantine Region Scheme (QRS) is introduced to defend against spam attacks in wireless sensor networks where malicious antinodes frequently generate dummy spam messages to be relayed toward the sink. The aim of the attacker is the exhaustion of the sensor node batteries and the extra delay caused by processing the spam messages. Network-wide message authentication may solve this problem with a cost of cryptographic operations to be performed over all messages. QRS is designed to reduce this cost by applying authentication only whenever and wherever necessary. In QRS, the nodes that detect a nearby spam attack assume themselves to be in a quarantine region. This detection is performed by intermittent authentication checks. Once quarantined, a node continuously applies authentication measures until the spam attack ceases. In the QRS scheme, there is a tradeoff between the resilience against spam attacks and the number of authentications. Our experiments show that, in the worst-case scenario that we considered, a not quarantined node catches 80 percent of the spam messages by authenticating only 50 percent of all messages that it processe

    The survey on Near Field Communication

    Get PDF
    PubMed ID: 26057043Near Field Communication (NFC) is an emerging short-range wireless communication technology that offers great and varied promise in services such as payment, ticketing, gaming, crowd sourcing, voting, navigation, and many others. NFC technology enables the integration of services from a wide range of applications into one single smartphone. NFC technology has emerged recently, and consequently not much academic data are available yet, although the number of academic research studies carried out in the past two years has already surpassed the total number of the prior works combined. This paper presents the concept of NFC technology in a holistic approach from different perspectives, including hardware improvement and optimization, communication essentials and standards, applications, secure elements, privacy and security, usability analysis, and ecosystem and business issues. Further research opportunities in terms of the academic and business points of view are also explored and discussed at the end of each section. This comprehensive survey will be a valuable guide for researchers and academicians, as well as for business in the NFC technology and ecosystem.Publisher's Versio

    A tokenization-based communication architecture for HCE-Enabled NFC services

    Get PDF
    Following the announcement of Host Card Emulation (HCE) technology, card emulation mode based Near Field Communication (NFC) services have gained further appreciation as an enabler of the Cloud-based Secure Element (SE) concept. A comprehensive and complete architecture with a centralized and feasible business model for diverse HCE-based NFC services will be highly appreciated, particularly by Service Providers and users. To satisfy the need in this new emerging research area, a Tokenization-based communication architecture for HCE-based NFC services is presented in this paper. Our architecture proposes Two-Phased Tokenization to enable the identity management of both user and Service Provider. NFC Smartphone users can store, manage, and make use of their sensitive data on the Cloud for NFC services; Service Providers can also provide diverse card emulation NFC services easily through the proposed architecture. In this paper, we initially present the Two-Phased Tokenization model and then validate the proposed architecture by providing a case study on access control. We further evaluate the usability aspect in terms of an authentication scheme. We then discuss the ecosystem and business model comprised of the proposed architecture and emphasize the contributions to ecosystem actors. Finally, suggestions are provided for data protection in transit and at rest.This work is funded by KocSistem Information and Communication Services Inc. and Turkish Ministry of Science, Industry and Technology under SAN-TEZ Project no. 0726.STZ.2014Publisher's Versio

    Near Field Communication: From theory to practice

    Get PDF
    This book provides the technical essentials, state-of-the-art knowledge, business ecosystem and standards of Near Field Communication (NFC)by NFC Lab - Istanbul research centre which conducts intense research on NFC technology. In this book, the authors present the contemporary research on all aspects of NFC, addressing related security aspects as well as information on various business models. In addition, the book provides comprehensive information a designer needs to design an NFC project, an analyzer needs to analyze requirements of a new NFC based system, and a programmer needs to implement an application. Furthermore, the authors introduce the technical and administrative issues related to NFC technology, standards, and global stakeholders. It also offers comprehensive information as well as use case studies for each NFC operating mode to give the usage idea behind each operating mode thoroughly. Examples of NFC application development are provided using Java technology, and security considerations are discussed in detail. Key Features: Offers a complete understanding of the NFC technology, including standards, technical essentials, operating modes, application development with Java, security and privacy, business ecosystem analysis Provides analysis, design as well as development guidance for professionals from administrative and technical perspectives Discusses methods, techniques and modelling support including UML are demonstrated with real cases Contains case studies such as payment, ticketing, social networking and remote shopping This book will be an invaluable guide for business and ecosystem analysts, project managers, mobile commerce consultants, system and application developers, mobile developers and practitioners. It will also be of interest to researchers, software engineers, computer scientists, information technology specialists including students and graduates.Publisher's Versio

    NFC internal: An indoor navigation system

    Get PDF
    PubMed ID: 25825976Indoor navigation systems have recently become a popular research field due to the lack of GPS signals indoors. Several indoors navigation systems have already been proposed in order to eliminate deficiencies; however each of them has several technical and usability limitations. In this study, we propose NFC Internal, a Near Field Communication (NFC)-based indoor navigation system, which enables users to navigate through a building or a complex by enabling a simple location update, simply by touching NFC tags those are spread around and orient users to the destination. In this paper, we initially present the system requirements, give the design details and study the viability of NFC Internal with a prototype application and a case study. Moreover, we evaluate the performance of the system and compare it with existing indoor navigation systems. It is seen that NFC Internal has considerable advantages and significant contributions to existing indoor navigation systems in terms of security and privacy, cost, performance, robustness, complexity, user preference and commercial availability.Publisher's Versio

    A survey on near field communication

    Get PDF
    Yakın Alan İletişimi iki elektronik cihazın kısa mesafede, yüksek frekansta ve düşük bant genişliğinde haberleşmesini sağlayan Radyo Frekansı ile Tanımlama tabanlı bir teknolojidir. NFC uygulamaları temel olarak üç ayrı çalışma kipi kullanırlar ve her bir kipin kullanımının getirmiş olduğu ayrı özellikler ve avantajlar mevcuttur. Her çalışma kipi farklı iş fırsatları ve katma değer olanakları sunabilmektedir. Bu çalışmada, öncelikle dünyada şu an itibari ile mevcut tüm NFC uygulamaları ve prototipleri, kullanmış oldukları çalışma kiplerine göre incelenmiştir. Daha sonra bu çalışmaların her biri ayrıntılı biçimde analiz edilmiş ve oluşturdukları katma değer ortaya konulmuştur. Çalışma, bu alandaki hedef beklentilerimizin konulması ile neticelendirilmiştir.Near Field Communication is a new, emerging technology based on RFID technology. It provides short distance, wireless communication between two NFC enabled mobile handsets at high frequency and low bandwidth NFC applications uses three operating modes so that each mode has distinguishable properties, advantages, and disadvantages; so that each one provides different possible business opportunities and different addedvalue perspectives. In this paper we examined available NFC applications and application prototypes, noticing the modes each one uses. We also have analyzed those applications and pointed out which value-added services provide which benefits. We also have provided our vision on this area in this work

    Development Agencies in Turkey: Evaluation of EADA from the Perspective of the Members of the Development Board

    No full text
    anemonDevelopment agencies in Turkey were founded as a new kind of public organizations in the 2000s in order to contribute to local development, and these agencies have been formed as an extension of the new development policy. In this study, the progress of development agencies in the world, the concept of region and regional development are discussed in general. Then, the structure of development agencies and progress in Turkey developments occurring after about Presidential System of Government agencies was introduced. Followed by, with a quantitative field study, primary data regarding the perspectives of the members of the development board of the Eastern Anatolia Development Agency (EADA) are presented and evaluated.Türkiye’de kalkınma ajansları 2000’li yıllarda yeni tür kamu teşkilatları olarak, bölgesel/yerel kalkınmaya katkı sağlamak amacıyla ve yeni kalkınma politikasının uzantısı olarak oluşturulmuşlardır. Bu çalışmada Dünya’da kalkınma ajanslarının gelişimi, bölge kavramı ve bölgesel kalkınma genel olarak ele alındıktan sonra, Türkiye’deki kalkınma ajanslarının yapısı ve kalkınma ajansları hakkında Cumhurbaşkanlığı Hükümet Sistemi sonrasında meydana gelen gelişmeler tanıtılmaktadır. Bunu takiben, yapılan bir alan araştırması ile Doğu Anadolu Kalkınma Ajansı (DAKA)’nın kalkınma kurulu üyelerinin bakış açılarına ilişkin temel veriler ortaya konmakta ve değerlendirilmektedir.80317
    corecore