
Mujdat Soyturk- Ph.D.
- V2X Communications at Marmara University
Mujdat Soyturk
- Ph.D.
- V2X Communications at Marmara University
About
53
Publications
16,438
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
387
Citations
Introduction
V2X Communications (Research Group website: www.venit.org)
V2X - Cellular Networks (5G-V2X) (www.venit.org)
Vehicular Ad Hoc Networks (VANET) (www.venit.org)
Connected Cars (www.venit.org)
Intelligent Transportation Systems (ITS) (www.venit.org)
Internet of Things (IoT) and Big Data: Sensing and Networking
Wireless and Mobile Networks.(Research Group website: http://mimoza.marmara.edu.tr/~mujdat.soyturk/WiNS-RG/default.html)
Sensor & Ad Hoc Networks
Current institution
Additional affiliations
November 2012 - present
May 2007 - November 2012
August 2008 - April 2012
Education
December 2008 - June 2009
October 2002 - July 2007
October 1999 - June 2002
Publications
Publications (53)
Vehicular networks are inseparable components of a smart city environment due to several applications that improve the quality of life, safety, and security. Applications of vehicular networks vary from safety applications such as blind spot warning and traffic light violations to entertainment such as streaming media or convenience such as parking...
This paper presents an overview of how Artificial Intelligence (AI) and edge technology have been used to improve wireless connectivity in multiple industrial Use Cases (UCs) of the EU project “Intelligent Secure Trustable Things” (InSecTT). We present a brief introduction of the InSecTT framework for crossdomain architecture design, which targets...
With the advent of 5G, there has been a significant surge in the deployment of Internet of Things (IoT) devices. This proliferation, while promising, has simultaneously highlighted crucial security vulnerabilities of IoT devices due to their inherent lack of robust security features. This research focuses on enhancing the security of the IoT ecosys...
This chapter discusses modern smart manufacturing systems, the challenges in building such systems, and their vulnerabilities due to the lack of security features. The manufacturing industry has been revolutionized by the rapid growth of Wireless Sensor Networks (WSN) and the Internet of Things (IoT). Today, smart manufacturing systems are essentia...
The Internet of Things (IoT) is increasingly used in every application field. Wi-Fi-based communication is the most preferred choice in wireless IoT systems due to its accessibility, high bandwidth, affordability, and versatility. However, security vulnerabilities in IoT devices pose considerable risks, especially in industrial and critical applica...
The exponential growth of data in this digital age has necessitated advanced methodologies to effectively manage, process, and analyze vast datasets. The convergence of big data and AI presents a transformative opportunity across various sectors, yet it poses unique challenges in managing the scale, speed, and complexity of data. This chapter provi...
In this chapter, the past and present situations of the reliability domain are discussed. As of today, most industries are in the transfer from test-to-pass approaches to more advanced strategies. These strategies currently are to determine the reliability capability by applying (where possible) the test-to-failure concept, extending reliability qu...
The future of reliability is bright as each electronics company is spending 1–5% of their annual sales on cost of non-quality. These costs are related to product failures prior to the end of its warranty period. If even a portion of these costs are reduced, it would result in a substantial profit increase. Progress in the area of reliability can be...
div>The United Nation Economic Commission for Europe (UNECE) Regulation 155—Cybersecurity and Cybersecurity Management System (UN R155) mandates the development of cybersecurity management systems (CSMS) as part of a vehicle’s lifecycle. An inherent component of the CSMS is cybersecurity risk management and assessment. Validation and verification t...
The future of goods transportation will rely on increased efficiency, lower risks, and diminished delays through the use of vehicle platoons that benefit from vehicular connectivity using V2X (Vehicle to Everything) applications. This article describes a system that offers the aforementioned vehicular connectivity to platoons, based on AI-enhanced...
Abstract-The proliferation of Internet of Things (IoT) applications across various domains has raised concerns about the security of wireless communication, particularly against jamming attacks. This paper presents an in-depth analysis of four jamming attack types-constant, random, pulsed, and barrage-on IoT network performance in noisy and noisele...
DECICE is a Horizon Europe project that is developing an AI-enabled open and portable management framework for automatic and adaptive optimization and deployment of applications in computing continuum encompassing from IoT sensors on the Edge to large-scale Cloud / HPC computing infrastructures. In this paper, we describe the DECICE framework and a...
IoT-based networks are vulnerable to jamming attacks due to their large-scale deployment and shared communication environment. Resource constraints and the low computational power of IoT devices make it harder to implement high-performance ML-based architectures for jamming detection. In this work, the effects of jamming attacks on a Wi-Fi network...
Vehicle platooning is one of the important V2X applications for automated and connected cars. It provides various benefits including low CO2 emissions and low fuel consumption in addition to traffic efficiency and safety. However, due the short distances between the vehicles and the obstacles in the environment, the communication reliability become...
Many devices and systems perform a specific function by working with position data obtained from GPS/GNSS receivers in NMEA 0183 or a similar format. In the testing phase of these devices and systems, position data is usually artificially produced and fed to the systems, so that systems can be tested based on variable positioning information. This...
Building on many discoveries and inventions, electronics
started affecting people’s everyday lives in a significant
fashion following the invention of the first solid state transistor in
late 1940s. The miniaturization paved way for the mass electronics
production and later the digital revolution, the outcomes of
which are visible to all members of...
Sensor nodes in a Wireless Sensor Network (WSN) can be dispersed over a remote sensing area (e.g., the regions that are hardly accessed by human beings). In such kinds of networks, data collection becomes one of the major issues. Getting connected to each sensor node and retrieving the information in time introduces new challenges. Mobile sink usag...
Sensor nodes in a Wireless Sensor Network (WSN) can be dispersed over a remote sensing area e.g. the regions that cannot be accessed by human beings (inaccessible regions). In such kind of networks, data collection becomes one of the major issues. Getting connected to each sensor node and retrieving the information in time introduces new challenges...
Canonical Algorithms, Adaptive Algorithms, One-Max Problem, Rastrigin’s Function, Genetic Algorithms, Evolutionary algorithms
Clustering algorithms improve network manage-ability through several topology partitioning techniques. In some particular cases, such as vehicular ad hoc network (VANETs) communications, significant performance improvements can be introduced via clustered networking solutions whereas merging clusters for the sake of scalability may lead to degraded...
There is a number of ways to estimate the number of people in a particular area. From image processing to movement pattern analysis, the sheer number of methods exist in the literature. An interesting one among these methods is the one estimating with the use of signal processing. Because it is much cheaper compared to the other methods in the lite...
Abstract—In this study, the road surface irregularities (pits, bumps, holes, speed breakers, etc.) is intended to be detected and identified with a system to be placed on the vehicles. For this purpose; a vibration-sensitive system is designed consisting of sensors, processor, and GPS receiver as hardware and the algorithms to be used for analyzing...
Wireless Sensor Networks consist of battery-limited sensor nodes which have the ability of sensing the environment, communicating with other nodes and processing the data. Large number of sensor node deployment over a geographical area imposes some constraints on the retrieval of the data. The use of mobile sinks (e.g., Unmanned Aerial Vehicle, UAV...
Resource limitations of sensor nodes in wireless sensor networks (WSN) bound the performance on its implementations. Main concern becomes utilizing these limited resources (CPU, memory, bandwidth, battery) as efficient as possible. Their efficiency is mostly affected by the applied routing algorithm, which carries gathered data to inclined/intended...
The packet delivery ratio and throughput in Vehicular Ad Hoc Networks (VANETs) depend on the network connectivity and degrade as the connectivity decreases. A delay-tolerant approach increases the packet delivery ratio in partially connected networks. In the previous studies, the packet lifetime and the vehicle's packet carry time are determined to...
Classical ad-hoc network algorithms become impractical for Vehicular Ad Hoc Networks when density of vehicles is low in rural areas and during the periods when the vehicle traffic is low in cities (such as at night). End-to-end connectivity requirement of these algorithms causes deflection. Connections get broken when a suitable network element isn...
Low density of vehicles in rural areas and during the periods when the vehicle traffic is low in cities (such as at night) makes the classical ad-hoc network algorithms impractical for Vehicular Ad Hoc Networks. End-to-end connectivity requirement of these algorithms causes this deflection. Connections get broken when a suitable network element isn...
The nature of military operations introduces additional requirements on sensor and ad-hoc networks such as reliability and operating in real-time. Although there has been many techniques providing reliability and real-time data communication in the literature, their implementations challenge with resource limitations peculiar to Wireless Sensor Net...
In wireless sensor networks, energy-aware and network-lifetime prolonging techniques are proposed, as the energy becomes the most valuable resource. Most of these techniques use complex calculations failing to be easy to implement. Another approach is to use mobile-sink node to enhance the performance metrics. However, these techniques are not scal...
In this paper, we propose a void avoidance algorithm for the stateless weight routing (SWR) algorithm which was developed stateless geographical routing protocol for wireless sensor and ad hoc networks. In order to demonstrate the efficiency of the method we started with the illustration of transmission coverage of relay nodes during the course of...
As the energy becomes the most valuable resource in the wireless sensor networks, to prolong the lifetime of the network, energy-aware protocols are proposed which use the energy minimization techniques and multi-hop paths. However, multi-hop paths and complex calculations at nodes introduce delay and processing overhead. Providing energy-efficienc...
A novel source-initiated geographical data flow technique, called stateless weighted routing (SWR), is presented in this paper. Nodes keep only their own virtual geographical position and require no local topological information. Each node calculates the weight of its own. Initially, this value is its relative distance to the sink. Each node decide...
A virtual cell layout (VCL) based dynamic source routing (VB-DSR) technique is introduced for the mobile subsystem of the next generation tactical communications systems. VB-DSR uses a dynamic source routing (DSR) protocol over the VCL structure, which is a resource management and clustering technique for tactical communications. The application of...
Technological advances in wireless communications and nanotechnologies made use of sensor-involved applications and systems for homeland security and safety more appealing. Application area can be extended from battlefield or security applications such as target detection to humanitarian applications such as disaster recovery, pollution detection,...
Wireless Local Area Networks (WLANs) provide cost-effectiveness and flexibility to the network and provide mobility to the network users. However, there are potential problems due to wireless communications and applied security protocols. In this paper, the security mechanisms and protocols for wireless local area networks; WEP and IEEE 802.11i are...