User Guide
Why can I only view 3 results?
You can also view all results when you are connected from the network of member institutions only. For non-member institutions, we are opening a 1-month free trial version if institution officials apply.
So many results that aren't mine?
References in many bibliographies are sometimes referred to as "Surname, I", so the citations of academics whose Surname and initials are the same may occasionally interfere. This problem is often the case with citation indexes all over the world.
How can I see only citations to my article?
After searching the name of your article, you can see the references to the article you selected as soon as you click on the details section.
  Citation Number 3
 Views 11
NESNELERİN İNTERNETİNDE ZIGBEE 3.0 AĞLARINA GÜVENLİ KATILIM İÇİN YENİ BİR MODEL ÖNERİSİ
2019
Journal:  
Uluslararası Bilgi Güvenliği Mühendisliği Dergisi
Author:  
Abstract:

Günümüzde İnternet, günlük yaşamda çok önemli bir yere sahiptir. Nesnelerin İnterneti de özellikle modern İnternet dünyasında en çok kullanılan teknolojilerden birisi olmuştur. Nesnelerin İnterneti teknolojisi, iletişim ve haberleşme protokolleri sayesinde nesnelere ait verileri toplayıp analizini yaparak nesneleri kontrol eder. Yaygınlaşan akıllı nesnelerin birbiriyle iletişim halinde olması ve İnternete bağlı olması çeşitli siber saldırılara olanak sağlamaktadır. Herhangi bir ihlal durumunda olumsuz sonuçlar nedeniyle Nesnelerin İnternetinde güvenlik konusu önem taşımaktadır. Bu makalede, Nesnelerin İnternetinde en çok kullanılan teknolojilerden biri olan ZigBee ele alınmıştır. ZigBee protokolündeki güvenlik açıklarına çözüm olarak yeni bir model önerilmiş, uygulanmış ve sonuçları değerlendirilmiştir.

Keywords:

A new model for secure murder on the ZIGBEE 3.0 networks on the Internet
2019
Author:  
Abstract:

Today, the internet has a very important place in everyday life. The Internet of Things has also become one of the most used technologies, especially in the modern Internet world. Through the Internet of Things technology, communication and communication protocols, it collects and analyses the data of the objects and controls the objects. The fact that spreading intelligent objects are in communication with each other and connected to the Internet enables various cyber attacks. In case of any infringement, the security issue on the Internet of Things is of importance due to negative consequences. In this article, we discuss ZigBee, one of the most used technologies in the Internet of Things. A new model was proposed, implemented and the results were evaluated as a solution to the security disadvantages in the ZigBee protocol.

Keywords:

Citation Owners
Attention!
To view citations of publications, you must access Sobiad from a Member University Network. You can contact the Library and Documentation Department for our institution to become a member of Sobiad.
Off-Campus Access
If you are affiliated with a Sobiad Subscriber organization, you can use Login Panel for external access. You can easily sign up and log in with your corporate e-mail address.
Similar Articles










Uluslararası Bilgi Güvenliği Mühendisliği Dergisi

Field :   Fen Bilimleri ve Matematik; Mühendislik

Journal Type :   Uluslararası

Metrics
Article : 46
Cite : 210
Uluslararası Bilgi Güvenliği Mühendisliği Dergisi