Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ilker Korkmaz is active.

Publication


Featured researches published by Ilker Korkmaz.


international conference on sensor technologies and applications | 2008

On the IEEE 802.15.4 MAC Layer Attacks: GTS Attack

Radosveta Sokullu; Orhan Dagdeviren; Ilker Korkmaz

In the last several years IEEE 802.15.4 has been accepted as a major MAC layer protocol for wireless sensor networks (WSNs) and has attracted the interest of there search community involved in security issues as the increased range of application scenarios bring out new possibilities for misuse and taking improper advantage of sensor nodes and their operation. As these nodes are very resource restrained such possible attacks and their early detection must be carefully considered. This paper surveys the known attacks on wireless sensor networks, identifies and investigates a new attack, guaranteed time slot (GTS) attack, taking as a basis the IEEE 802.15.4 MAC protocol for WSN. The GTS attack is simulated with different scenarios using ns-2 and the results are evaluated both from the point of view of the attacked and the attacker.


Iete Technical Review | 2011

A Survey of Agent Technologies for Wireless Sensor Networks

Orhan Dagdeviren; Ilker Korkmaz; Fatih Tekbacak; Kayhan Erciyes

Abstract Wireless sensor networks (WSNs) do not have a fixed infrastructure and consist of sensor nodes that perform sensing and communicating tasks. The WSNs have large application spectrum such as habitat monitoring, military surveillance, and target tracking, where sensor nodes may operate distributed in highly dynamic environments. Battery-constrained sensor nodes may aggregate the sensed data, localize themselves, and route the packets in an energy-efficient and decentralized manner to enable running the applications. Agents are capable of independent and autonomous action, so that they can successfully carry out tasks that have been delegated to them, thus agent-based approaches are very suitable to apply as the solution of the problems occurring in WSNs. So far many agent-based approaches were proposed for WSNs. This paper surveys the agent technologies for sensor networks by providing a classification, objectives and costs of these approaches with the open research problems. To the best of our knowledge, this is the first study that covers the intersection of the agent technology and sensor networks from a wide perspective.


Computers & Electrical Engineering | 2015

A cloud based and Android supported scalable home automation system

Ilker Korkmaz; Senem Kumova Metin; Alper Gurek; Caner Gur; Cagri Gurakin; Mustafa Akdeniz

A cloud based and Android supported scalable home automation system is proposed.The mechanism relies on the distributed Google Cloud Platform.Google Cloud Messaging supports the communication infrastructure in the system.The prototype is evaluated based on a list of criteria for an adequate system. In this paper, an Android based home automation system that allows multiple users to control the appliances by an Android application or through a web site is presented. The system has three hardware components: a local device to transfer signals to home appliances, a web server to store customer records and support services to the other components, and a mobile smart device running Android application. Distributed cloud platforms and Google services are used to support messaging between the components. The prototype implementation of the proposed system is evaluated based on the criteria considered after the requirement analysis for an adequate home automation system. The paper presents the outcomes of a survey carried out regarding the properties of home automation systems, and also the evaluation results of the experimental tests conducted with volunteers on running prototype.


2013 High Capacity Optical Networks and Emerging/Enabling Technologies | 2013

An Android based home automation system

Alper Gurek; Caner Gur; Cagri Gurakin; Mustafa Akdeniz; Senem Kumova Metin; Ilker Korkmaz

In recent years, the number of network enabled digital devices at homes has been increasing fast. With the rapid expansion of the Internet, the owners have been requesting remote control and monitoring of these in-home appliances. This leads to networking these appliances to form a kind of home automation system. In this paper, an Android based home automation system that allows multiple users to control the appliances by an Android application or through a Web site is presented. The system has three hardware components: a local device to transfer signals to home appliances, a Web server to store customer records and support services to the other components, and a mobile smart device running Android application. Distributed cloud platforms and services of Google are used to support messaging between the components. The prototype implementation of the proposed system is evaluated based on the criteria considered after the requirement analysis for an adequate home automation system.


security of information and networks | 2010

The weak and the strong password preferences: a case study on turkish users

Ilker Korkmaz; Mehmet Emin Dalkiliç

Considering the computer authentication, any password shall not only be private to its owner but also be chosen as not to be predicted easily by others. The passwords used in authentication processes of any critical system should be strong as not to be cracked easily. In this context, the strong password choice gets significance for the general system security. This study aims to reveal the proper and improper properties on password preferences via examining the real samples. The method used in this work is first to gather the real passwords in plaintext, then to crack the encrypted forms of them and finally to investigate statistical queries on those passwords in order to distinguish the common weak and strong characteristics. As the case study, the experiments are conducted on real passwords of Turkish users in an actively running system. The results of the experiments are categorized for weak and strong passwords. Moreover, the common tendencies on password choice are evaluated.


2016 HONET-ICT | 2016

A 2-hop coloring-based collision free infrastructure design for Wireless Sensor Networks

Ilker Korkmaz; Orhan Dagdeviren; Mehmet Emin Dalkiliç

This paper mainly proposes a design for a communication infrastructure for Wireless Sensor Networks. The proposed design prevents message collisions by arranging the time schedules to send, receive, forward and overhear packets of the nodes considering 2-hop graph coloring mechanism. The system aims to exclude the compromised nodes in the network using the overhearing mechanism, and copes with recovering the paths of the legitimate nodes using multipath redundancy. The proposed scheduling-based and overhearing supported infrastructure brings the advantage of providing the Sensor Networks with both reliable communication using backup paths and energy conservation by preventing the collisions.


federated conference on computer science and information systems | 2014

An energy conservative wireless sensor network model for object tracking

Gokcer Peynirci; Ilker Korkmaz; Muharrem Gurgen

This study aims to find the relationship between energy consumption level and object tracking success in an object tracking sensor network (OTSN). Convenient use of energy proposes a great challenge for wireless sensor network (WSN) design and the balance between successful object tracking and low energy consumption is a tight one. To address this issue, we propose a new network operation scheme for object tracking, implement this scheme in Network Simulator 2 (ns-2) and present the obtained results of the conducted simulation experiments. The simulation results show that the proposed method can be used to track objects in a WSN network in an energy conservative manner.


wireless personal multimedia communications | 2007

An Investigation on IEEE 802.15.4 MAC Layer Attacks

Radosveta Sokullu; Ilker Korkmaz; Orhan Dagdeviren; Anelia Mitseva; Neeli R. Prasad


Archive | 2009

GTS Attack: An IEEE 802.15.4 MAC Layer Attack in Wireless Sensor Networks

Radosveta Sokullu; Ilker Korkmaz; Orhan Dagdeviren


annual conference on computers | 2010

A mobile patient monitoring system using RFID

Ilker Korkmaz; Coskun Atay; George J. Kyparisis

Collaboration


Dive into the Ilker Korkmaz's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Alper Gurek

İzmir University of Economics

View shared research outputs
Top Co-Authors

Avatar

Cagri Gurakin

İzmir University of Economics

View shared research outputs
Top Co-Authors

Avatar

Caner Gur

İzmir University of Economics

View shared research outputs
Top Co-Authors

Avatar

Fatih Tekbacak

İzmir Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Mustafa Akdeniz

İzmir University of Economics

View shared research outputs
Top Co-Authors

Avatar

Senem Kumova Metin

İzmir University of Economics

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge