2 sonuçlar
Arama Sonuçları
Listeleniyor 1 - 2 / 2
Yayın Design and implementation of a smart beehive and its monitoring system using microservices in the context of IoT and open data(Elsevier B.V., 2022-05) Aydın, Şahin; Aydın, Mehmet NafizIt is essential to keep honey bees healthy for providing a sustainable ecological balance. One way of keeping honey bees healthy is to be able to monitor and control the general conditions in a beehive and also outside of a beehive. Monitoring systems offer an effective way of accessing, visualizing, sharing, and managing data that is gathered from performed agricultural and livestock activities for domain stakeholders. Such systems have recently been implemented based on wireless sensor networks (WSN) and IoT to monitor the activities of honey bees in beehives as well. Scholars have shown considerable interests in proposing IoT- and WSN-based beehive monitoring systems, but much of the research up to now lacks in proposing appropriate architecture for open data driven beehive monitoring systems. Developing a robust monitoring system based on a contemporary software architecture such as microservices can be of great help to be able to control the activities of honey bees and more importantly to be able to keep them healthy in beehives. This research sets out to design and implementation of a sustainable WSN-based beehive monitoring platform using a microservice architecture. We pointed out that by adopting microservices one can deal with long-standing problems with heterogeneity, interoperability, scalability, agility, reliability, maintainability issues, and in turn achieve sustainable WSN-based beehive monitoring systems.Yayın Quarantine region scheme to mitigate spam attacks in wireless sensor networks(IEEE, 2006-08) Coşkun, Vedat; Çayırcı, Erdal; Levi, Albert; Sancak, SerdarThe Quarantine Region Scheme (QRS) is introduced to defend against spam attacks in wireless sensor networks where malicious antinodes frequently generate dummy spam messages to be relayed toward the sink. The aim of the attacker is the exhaustion of the sensor node batteries and the extra delay caused by processing the spam messages. Network-wide message authentication may solve this problem with a cost of cryptographic operations to be performed over all messages. QRS is designed to reduce this cost by applying authentication only whenever and wherever necessary. In QRS, the nodes that detect a nearby spam attack assume themselves to be in a quarantine region. This detection is performed by intermittent authentication checks. Once quarantined, a node continuously applies authentication measures until the spam attack ceases. In the QRS scheme, there is a trade-off between the resilience against spam attacks and the number of authentications. Our experiments show that, in the worst-case scenario that we considered, a not quarantined node catches 80 percent of the spam messages by authenticating only 50 percent of all messages that it processes.












