Ilker Korkmaz - Academia.edu (original) (raw)

Papers by Ilker Korkmaz

Research paper thumbnail of A mobile patient monitoring system using RFID

Proceedings of the 14th Wseas International Conference on Computers Part of the 14th Wseas Cscc Multiconference Volume Ii, Jul 23, 2010

In the last decade, Radio Frequency Identification (RFID) has become popular in so many fields fr... more In the last decade, Radio Frequency Identification (RFID) has become popular in so many fields from military to industry applications. RFID tags have been embedded into many various products especially in logistics sector. A tag stores individual information of its attached object and an RFID reader communicates with the tag in radio frequencies to identify the object. This object to be monitored may also be a human. In our work, RFID technology is applied in health care systems. The system supports wireless mobile communication between the RFID tags and readers. Each patient available in the system is inherently mobile and wears a bracelet integrated with a unique tag, and the readers are mobile PDA devices each including a wireless RFID reader card. The proposed application can be used to identify and monitor the patients.

Research paper thumbnail of The weak and the strong password preferences

Proceedings of the 3rd international conference on Security of information and networks - SIN '10, 2010

Considering the computer authentication, any password shall not only be private to its owner but ... more Considering the computer authentication, any password shall not only be private to its owner but also be chosen as not to be predicted easily by others. The passwords used in authentication processes of any critical system should be strong as not to be cracked easily. In this context, the strong password choice gets significance for the general system security. This study aims to reveal the proper and improper properties on password preferences via examining the real samples. The method used in this work is first to gather the real passwords in plaintext, then to crack the encrypted forms of them and finally to investigate statistical queries on those passwords in order to distinguish the common weak and strong characteristics. As the case study, the experiments are conducted on real passwords of Turkish users in an actively running system. The results of the experiments are categorized for weak and strong passwords. Moreover, the common tendencies on password choice are evaluated.

Research paper thumbnail of A Survey on Security in Wireless Sensor Networks

Research paper thumbnail of An Energy Conservative Wireless Sensor Network Model for Object Tracking

Proceedings of the 2014 Federated Conference on Computer Science and Information Systems, 2014

This study aims to find the relationship between energy consumption level and object tracking suc... more This study aims to find the relationship between energy consumption level and object tracking success in an object tracking sensor network (OTSN). Convenient use of energy proposes a great challenge for wireless sensor network (WSN) design and the balance between successful object tracking and low energy consumption is a tight one. To address this issue, we propose a new network operation scheme for object tracking, implement this scheme in Network Simulator 2 (ns-2) and present the obtained results of the conducted simulation experiments. The simulation results show that the proposed method can be used to track objects in a WSN network in an energy conservative manner.

Research paper thumbnail of An Android based home automation system

2013 High Capacity Optical Networks and Emerging/Enabling Technologies, 2013

Research paper thumbnail of GTS Attack: An IEEE 802.15. 4 MAC Layer Attack in Wireless Sensor Networks

In the last several years IEEE 802.15.4 has been accepted as the major MAC layer protocol for wir... more In the last several years IEEE 802.15.4 has been accepted as the major MAC layer protocol for wireless sensor networks (WSNs). It has attracted the interest of the research community involved in security issues because the increased range of application scenarios brings out new possibilities for misuse and taking improper advantage of sensor nodes and their operation. As these nodes are very resource restrained such possible attacks and their early detection must be carefully con-sidered. This paper surveys the known attacks on wireless sensor networks, identifies and investigates a new attack, Guaranteed Time Slot (GTS) attack, taking as a basis the IEEE 802.15.4 MAC protocol for WSN. The GTS Attack is simulated with different scenarios using ns-2 and the results are evaluated both from the point of view of the attacked and the attacker.

Research paper thumbnail of On the Cache Performance of Time-Efficient Sorting Algorithms

orhandagdeviren.com

Abstract. The cache configuration is an important concern affecting the performance of sorting al... more Abstract. The cache configuration is an important concern affecting the performance of sorting algorithms. In this paper, we give a performance evaluation of cache tuned time efficient sorting algorithms. We focus on the Level 1 and Level 2 cache performance of ...

Research paper thumbnail of A survey of agent technologies for wireless sensor networks

Abstract Wireless sensor networks (WSNs) do not have a fixed infrastructure and consist of sensor... more Abstract Wireless sensor networks (WSNs) do not have a fixed infrastructure and consist of sensor nodes that perform sensing and communicating tasks. The WSNs have large application spectrum such as habitat monitoring, military surveillance, and target tracking, ...

Research paper thumbnail of On the IEEE 802.15.4 MAC Layer Attacks: GTS Attack

2008 Second International Conference on Sensor Technologies and Applications (sensorcomm 2008), 2008

In the last several years IEEE 802.15.4 [1] has been accepted as a major MAC layer protocol for w... more In the last several years IEEE 802.15.4 [1] has been accepted as a major MAC layer protocol for wireless sensor networks (WSNs) and has attracted the interest of the research community involved in security issues as the increased range of application scenarios bring out new possibilities for misuse and taking improper advantage of sensor nodes and their operation. As these nodes are very resource restrained such possible attacks and their early detection must be carefully considered. This paper surveys the known attacks on wireless sensor networks, identifies and investigates a new attack, Guaranteed Time Slot (GTS) attack, taking as a basis the IEEE 802.15.4 MAC protocol for WSN. The GTS Attack is simulated with different scenarios using ns-2 and the results are evaluated both from the point of view of the attacked and the attacker.

Research paper thumbnail of A mobile patient monitoring system using RFID

Proceedings of the 14th Wseas International Conference on Computers Part of the 14th Wseas Cscc Multiconference Volume Ii, Jul 23, 2010

In the last decade, Radio Frequency Identification (RFID) has become popular in so many fields fr... more In the last decade, Radio Frequency Identification (RFID) has become popular in so many fields from military to industry applications. RFID tags have been embedded into many various products especially in logistics sector. A tag stores individual information of its attached object and an RFID reader communicates with the tag in radio frequencies to identify the object. This object to be monitored may also be a human. In our work, RFID technology is applied in health care systems. The system supports wireless mobile communication between the RFID tags and readers. Each patient available in the system is inherently mobile and wears a bracelet integrated with a unique tag, and the readers are mobile PDA devices each including a wireless RFID reader card. The proposed application can be used to identify and monitor the patients.

Research paper thumbnail of The weak and the strong password preferences

Proceedings of the 3rd international conference on Security of information and networks - SIN '10, 2010

Considering the computer authentication, any password shall not only be private to its owner but ... more Considering the computer authentication, any password shall not only be private to its owner but also be chosen as not to be predicted easily by others. The passwords used in authentication processes of any critical system should be strong as not to be cracked easily. In this context, the strong password choice gets significance for the general system security. This study aims to reveal the proper and improper properties on password preferences via examining the real samples. The method used in this work is first to gather the real passwords in plaintext, then to crack the encrypted forms of them and finally to investigate statistical queries on those passwords in order to distinguish the common weak and strong characteristics. As the case study, the experiments are conducted on real passwords of Turkish users in an actively running system. The results of the experiments are categorized for weak and strong passwords. Moreover, the common tendencies on password choice are evaluated.

Research paper thumbnail of A Survey on Security in Wireless Sensor Networks

Research paper thumbnail of An Energy Conservative Wireless Sensor Network Model for Object Tracking

Proceedings of the 2014 Federated Conference on Computer Science and Information Systems, 2014

This study aims to find the relationship between energy consumption level and object tracking suc... more This study aims to find the relationship between energy consumption level and object tracking success in an object tracking sensor network (OTSN). Convenient use of energy proposes a great challenge for wireless sensor network (WSN) design and the balance between successful object tracking and low energy consumption is a tight one. To address this issue, we propose a new network operation scheme for object tracking, implement this scheme in Network Simulator 2 (ns-2) and present the obtained results of the conducted simulation experiments. The simulation results show that the proposed method can be used to track objects in a WSN network in an energy conservative manner.

Research paper thumbnail of An Android based home automation system

2013 High Capacity Optical Networks and Emerging/Enabling Technologies, 2013

Research paper thumbnail of GTS Attack: An IEEE 802.15. 4 MAC Layer Attack in Wireless Sensor Networks

In the last several years IEEE 802.15.4 has been accepted as the major MAC layer protocol for wir... more In the last several years IEEE 802.15.4 has been accepted as the major MAC layer protocol for wireless sensor networks (WSNs). It has attracted the interest of the research community involved in security issues because the increased range of application scenarios brings out new possibilities for misuse and taking improper advantage of sensor nodes and their operation. As these nodes are very resource restrained such possible attacks and their early detection must be carefully con-sidered. This paper surveys the known attacks on wireless sensor networks, identifies and investigates a new attack, Guaranteed Time Slot (GTS) attack, taking as a basis the IEEE 802.15.4 MAC protocol for WSN. The GTS Attack is simulated with different scenarios using ns-2 and the results are evaluated both from the point of view of the attacked and the attacker.

Research paper thumbnail of On the Cache Performance of Time-Efficient Sorting Algorithms

orhandagdeviren.com

Abstract. The cache configuration is an important concern affecting the performance of sorting al... more Abstract. The cache configuration is an important concern affecting the performance of sorting algorithms. In this paper, we give a performance evaluation of cache tuned time efficient sorting algorithms. We focus on the Level 1 and Level 2 cache performance of ...

Research paper thumbnail of A survey of agent technologies for wireless sensor networks

Abstract Wireless sensor networks (WSNs) do not have a fixed infrastructure and consist of sensor... more Abstract Wireless sensor networks (WSNs) do not have a fixed infrastructure and consist of sensor nodes that perform sensing and communicating tasks. The WSNs have large application spectrum such as habitat monitoring, military surveillance, and target tracking, ...

Research paper thumbnail of On the IEEE 802.15.4 MAC Layer Attacks: GTS Attack

2008 Second International Conference on Sensor Technologies and Applications (sensorcomm 2008), 2008

In the last several years IEEE 802.15.4 [1] has been accepted as a major MAC layer protocol for w... more In the last several years IEEE 802.15.4 [1] has been accepted as a major MAC layer protocol for wireless sensor networks (WSNs) and has attracted the interest of the research community involved in security issues as the increased range of application scenarios bring out new possibilities for misuse and taking improper advantage of sensor nodes and their operation. As these nodes are very resource restrained such possible attacks and their early detection must be carefully considered. This paper surveys the known attacks on wireless sensor networks, identifies and investigates a new attack, Guaranteed Time Slot (GTS) attack, taking as a basis the IEEE 802.15.4 MAC protocol for WSN. The GTS Attack is simulated with different scenarios using ns-2 and the results are evaluated both from the point of view of the attacked and the attacker.