scispace - formally typeset
Search or ask a question
Author

Y. A. Sekercioglu

Bio: Y. A. Sekercioglu is an academic researcher from Monash University, Clayton campus. The author has contributed to research in topics: Wireless network & Network topology. The author has an hindex of 1, co-authored 1 publications receiving 315 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: This survey focuses on the energy efficiency issue and presents a comprehensive study of topology control techniques for extending the lifetime of battery powered WSNs, and identifies a number of open research issues for achieving energy efficiency through topological control.
Abstract: Large-scale, self-organizing wireless sensor and mesh network deployments are being driven by recent technological developments such as The Internet of Things (IoT), Smart Grids and Smart Environment applications. Efficient use of the limited energy resources of wireless sensor network (WSN) nodes is critically important to support these advances, and application of topology control methods will have a profound impact on energy efficiency and hence battery lifetime. In this survey, we focus on the energy efficiency issue and present a comprehensive study of topology control techniques for extending the lifetime of battery powered WSNs. First, we review the significant topology control algorithms to provide insights into how energy efficiency is achieved by design. Further, these algorithms are classified according to the energy conservation approach they adopt, and evaluated by the trade-offs they offer to aid designers in selecting a technique that best suits their applications. Since the concept of "network lifetime" is widely used for assessing the algorithms' performance, we highlight various definitions of the term and discuss their merits and drawbacks. Recently, there has been growing interest in algorithms for non-planar topologies such as deployments in underwater environments or multi-level buildings. For this reason, we also include a detailed discussion of topology control algorithms that work efficiently in three dimensions. Based on the outcomes of our review, we identify a number of open research issues for achieving energy efficiency through topology control.

335 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: The family of NL maximization techniques is introduced, the portrayal of rich variety definitions of NL design objective used for WSNs, and some design guidelines with examples are provided to show the potential improvements of the different design criteria.
Abstract: Emerging technologies, such as the Internet of Things, smart applications, smart grids, and machine-to-machine networks stimulate the deployment of autonomous, self-configuring, large-scale wireless sensor networks (WSNs). Efficient energy utilization is crucially important in order to maintain a fully operational network for the longest period of time possible. Therefore, network lifetime (NL) maximization techniques have attracted a lot of research attention owing to their importance in terms of extending the flawless operation of battery-constrained WSNs. In this paper, we review the recent developments in WSNs, including their applications, design constraints, and lifetime estimation models. Commencing with the portrayal of rich variety definitions of NL design objective used for WSNs, the family of NL maximization techniques is introduced and some design guidelines with examples are provided to show the potential improvements of the different design criteria.

502 citations

Journal ArticleDOI
TL;DR: This paper defines three types of Sybil attacks: SA-1, SA-2, and SA-3 according to the Sybil attacker's capabilities, and presents some Sybil defense schemes, including social graph-based Sybil detection (SGSD), behavior classification-basedSybil Detection (BCSD), and mobile Sybil Detection with the comprehensive comparisons.
Abstract: The emerging Internet-of-Things (IoT) are vulnerable to Sybil attacks where attackers can manipulate fake identities or abuse pseudoidentities to compromise the effectiveness of the IoT and even disseminate spam. In this paper, we survey Sybil attacks and defense schemes in IoT. Specifically, we first define three types Sybil attacks: SA-1, SA-2, and SA-3 according to the Sybil attacker’s capabilities. We then present some Sybil defense schemes, including social graph-based Sybil detection (SGSD), behavior classification-based Sybil detection (BCSD), and mobile Sybil detection with the comprehensive comparisons. Finally, we discuss the challenging research issues and future directions for Sybil defense in IoT.

308 citations

Journal ArticleDOI
Roberto Morabito1
TL;DR: This paper seeks to provide insights for future deployments through a comprehensive performance evaluation that aims to show the strengths and weaknesses of several low-power devices when handling container-virtualized instances.
Abstract: Lightweight virtualization technologies have revolutionized the world of software development by introducing flexibility and innovation to this domain. Although the benefits introduced by these emerging solutions have been widely acknowledged in cloud computing, recent advances have led to the spread of such technologies in different contexts. As an example, the Internet of Things (IoT) and mobile edge computing benefit from container virtualization by exploiting the possibility of using these technologies not only in data centers but also on devices, which are characterized by fewer computational resources, such as single-board computers. This has led to a growing trend to more efficiently redesign the critical components of IoT/edge scenarios (e.g., gateways) to enable the concept of device virtualization. The possibility for efficiently deploying virtualized instances on single-board computers has already been addressed in recent studies; however, these studies considered only a limited number of devices and omitted important performance metrics from their empirical assessments. This paper seeks to fill this gap and to provide insights for future deployments through a comprehensive performance evaluation that aims to show the strengths and weaknesses of several low-power devices when handling container-virtualized instances.

220 citations

12 Jul 2017
TL;DR: The LoRa architecture and the LoRaWAN protocol are addressed, expected to solve the connectivity problem of tens of billions of devices in the next decade.
Abstract: The Internet of Things (IoT) vision requires increasingly more sensor nodes interconnected and a network solution that may accommodate these requirements accordingly. In wireless sensor networks, there are energy-limited devices; therefore techniques to save energy have become a significant research trend. Other issues such as latency, range coverage, and bandwidth are important aspects in IoT. It is considering the massive number of expected nodes connected to the Internet. The LoRaWAN (Low Power WAN Protocol for Internet of Things), a data-link layer with long range, low power, and low bit rate, appeared as a promising solution for IoT in which, end-devices use LoRa to communicate with gateways through a single hop. While proprietary LPWAN (Low Power Wide Area Network) technologies are already hitting a large market, this paper addresses the LoRa architecture and the LoRaWAN protocol that is expected to solve the connectivity problem of tens of billions of devices in the next decade. Use cases are considered to illustrate its application alongside with a discussion about open issues and research opportunities.

216 citations

Journal ArticleDOI
TL;DR: An up-to-date survey on the sink mobility issue is presented and several representative solutions are described following the proposed taxonomy, to help readers comprehend the development flow within a category.
Abstract: Sink mobility has long been recognized as an efficient method of improving system performance in wireless sensor networks (WSNs), e.g. relieving traffic burden from a specific set of nodes. Though tremendous research efforts have been devoted to this topic during the last decades, yet little attention has been paid for the research summarization and guidance. This paper aims to fill in the blank and presents an up-to-date survey on the sink mobility issue. Its main contribution is to review mobility management schemes from an evolutionary point of view. The related schemes have been divided into four categories: uncontrollable mobility (UMM), path-restricted mobility (PRM), location-restricted mobility (LRM) and unrestricted mobility (URM). Several representative solutions are described following the proposed taxonomy. To help readers comprehend the development flow within the category, the relationship among different solutions is outlined, with detailed descriptions as well as in-depth analysis. In this way, besides some potential extensions based on current research, we are able to identify several open issues that receive little attention or remain unexplored so far.

167 citations