Fikret Sivrikaya
Technical University of Berlin
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Fikret Sivrikaya.
IEEE Network | 2004
Fikret Sivrikaya; Bülent Yener
Time synchronization is an important issue in multihop ad hoc wireless networks such as sensor networks. Many applications of sensor networks need local clocks of sensor nodes to be synchronized, requiring various degrees of precision. Some intrinsic properties of sensor networks, such as limited resources of energy, storage, computation, and bandwidth, combined with potentially high density of nodes make traditional synchronization methods unsuitable for these networks. Hence, there has been an increasing research focus on designing synchronization algorithms specifically for sensor networks. This article reviews the time synchronization problem and the need for synchronization in sensor networks, then presents in detail the basic synchronization methods explicitly designed and proposed for sensor networks.
intelligence and security informatics | 2007
Matthew Edman; Fikret Sivrikaya; Bülent Yener
In this paper we define a new metric for quantifying the degree of anonymity collectively afforded to users of an anonymous communication system. We show how our metric, based on the permanent of a matrix, can be useful in evaluating the amount of information needed by an observer to reveal the communication pattern as a whole. We also show how our model can be extended to include probabilistic information learned by an attacker about possible sender-recipient relationships. Our work is intended to serve as a complementary tool to existing information-theoretic metrics, which typically consider the anonymity of the system from the perspective of a single user or message.
international symposium on distributed computing | 2004
Costas Busch; Malik Magdon-Ismail; Fikret Sivrikaya; Bülent Yener
A MAC protocol specifies how nodes in a sensor network access a shared communication channel. Desired properties of such MAC protocol are: it should be distributed and contention-free (avoid collisions); it should self-stabilize to changes in the network (such as arrival of new nodes), and these changes should be contained, i.e., affect only the nodes in the vicinity of the change; it should not assume that nodes have a global time reference, i.e., nodes may not be time-synchronized. We give the first MAC protocols that satisfy all of these requirements, i.e., we give distributed, contention-free, self-stabilizing MAC protocols which do not assume a global time reference. Our protocols self-stabilize from an arbitrary initial state, and if the network changes the changes are contained and the protocol adjusts to the local topology of the network. The communication complexity, number and size of messages, for the protocol to stabilize is small (logarithmic in network size).
IEEE Transactions on Dependable and Secure Computing | 2016
Kerem Kaynar; Fikret Sivrikaya
Attack graphs show possible paths that an attacker can use to intrude into a target network and gain privileges through series of vulnerability exploits. The computation of attack graphs suffers from the state explosion problem occurring most notably when the number of vulnerabilities in the target network grows large. Parallel computation of attack graphs can be utilized to attenuate this problem. When employed in online network security evaluation, the computation of attack graphs can be triggered with the correlated intrusion alerts received from sensors scattered throughout the target network. In such cases, distributed computation of attack graphs becomes valuable. This article introduces a parallel and distributed memory-based algorithm that builds vulnerability-based attack graphs on a distributed multi-agent platform. A virtual shared memory abstraction is proposed to be used over such a platform, whose memory pages are initialized by partitioning the network reachability information. We demonstrate the feasibility of parallel distributed computation of attack graphs and show that even a small degree of parallelism can effectively speed up the generation process as the problem size grows. We also introduce a rich attack template and network model in order to form chains of vulnerability exploits in attack graphs more precisely.
international conference on game theory for networks | 2009
Manzoor Ahmed Khan; Ahmet Cihat Toker; Cuong Troung; Fikret Sivrikaya; Sahin Albayrak
The current trend in wireless communication networks involves the integration of different wireless access technologies into a single operator network. The possible leveraging of high deployment costs, and the possibility to increase revenue have also introduced the concept of network sharing between different operators. The problem of optimal allocation of bandwidth to multimedia applications over different wireless access networks, is augmented with the possibility of using the bandwidth of other operators who are willing to share bandwidth.We formulate the allocation of bandwidth within the operator network and distribution of excess bandwidth among operators as cooperative bargaining games. We provide distribution and allocation rules based on the Kalai-Smorodinsky Solution, and provide bandwidth offer algorithms based on these rules. We compare this integrated approach with the service and capacity based approaches in the literature.
Wireless Networks | 2007
Bülent Yener; Malik Magdon-Ismail; Fikret Sivrikaya
This work considers a multi-hop sensor network and addresses the problem of minimizing power consumption in each sensor node locally while ensuring two global (i.e., network wide) properties: (i) communication connectivity, and (ii) sensing coverage. A sensor node saves energy by suspending its sensing and communication activities according to a Markovian stochastic process. We show that a power level to induce a coverage radius
ifip wireless days | 2008
Manzoor Ahmed Khan; Cuong Truong; Thomas Geithner; Fikret Sivrikaya; Sahin Albayrak
international conference on communications | 2009
Fikret Sivrikaya; Thomas Geithner; Cuong Truong; Manzoor Ahmed Khan; Sahin Albayrak
\frac{w(n)}{n}
Wireless Networks | 2009
Fikret Sivrikaya; Bülent Yener
Distributed Computing | 2008
Costas Busch; Malik Magdon-Ismail; Fikret Sivrikaya; Bülent Yener
is sufficient for connectivity provided that w(n)→∞. The paper presents a Markov model and its solution for steady state distributions to determine the operation of a single node. Given the steady state probabilities, we construct a non-linear optimization problem to minimize the power consumption. Simulation studies to examine the collective behavior of large number of sensor nodes produce results that are predicted by the analytical model.