Arama Sonuçları

Listeleniyor 1 - 2 / 2
  • Yayın
    A role-based service level NFC ecosystem model
    (Springer, 2013-02) Ok, Kerem; Coşkun, Vedat; Özdenizci Köse, Büşra; Aydın, Mehmet Nafiz
    Near Field Communication (NFC) is a short range wireless communication technology allowing to communicate mobile devices within close proximity. It provides opportunity for service providers to offer various value added services to customers. NFC technology allows the usage of wide range of applications and eliminates the obligation to carry additional components other than the mobile device such as credit or payment cards, tickets, identification cards or keys. Despite its technological advantages over alternative ones, the NFC business ecosystems and services are yet to take off. The problems mainly arise with the business issues triggered by different and mostly conflicting needs of many actors in the ecosystem and several additional technical issues. In this study, by adopting a role-based service ecosystem modeling, we propose an NFC ecosystem model which perfectly specifies the roles in the ecosystem, and defines set of activities for each role, and communication structure. We analyzed NFC ecosystem in three phases as pre-installation, installation, and service usage. We have defined the activities and communication structure in the first two phases, and finally investigated the service usage phase in three different operating modes of NFC. After giving the details of the proposed ecosystem model, two use cases are given to validate the developed ecosystem model. We complete our study by discussing the requirement satisfaction.
  • Yayın
    Quarantine region scheme to mitigate spam attacks in wireless sensor networks
    (IEEE, 2006-08) Coşkun, Vedat; Çayırcı, Erdal; Levi, Albert; Sancak, Serdar
    The Quarantine Region Scheme (QRS) is introduced to defend against spam attacks in wireless sensor networks where malicious antinodes frequently generate dummy spam messages to be relayed toward the sink. The aim of the attacker is the exhaustion of the sensor node batteries and the extra delay caused by processing the spam messages. Network-wide message authentication may solve this problem with a cost of cryptographic operations to be performed over all messages. QRS is designed to reduce this cost by applying authentication only whenever and wherever necessary. In QRS, the nodes that detect a nearby spam attack assume themselves to be in a quarantine region. This detection is performed by intermittent authentication checks. Once quarantined, a node continuously applies authentication measures until the spam attack ceases. In the QRS scheme, there is a trade-off between the resilience against spam attacks and the number of authentications. Our experiments show that, in the worst-case scenario that we considered, a not quarantined node catches 80 percent of the spam messages by authenticating only 50 percent of all messages that it processes.