Mujdat Soyturk

Mujdat Soyturk
  • Ph.D.
  • V2X Communications at Marmara University

About

53
Publications
16,438
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
387
Citations
Introduction
V2X Communications (Research Group website: www.venit.org) V2X - Cellular Networks (5G-V2X) (www.venit.org) Vehicular Ad Hoc Networks (VANET) (www.venit.org) Connected Cars (www.venit.org) Intelligent Transportation Systems (ITS) (www.venit.org) Internet of Things (IoT) and Big Data: Sensing and Networking Wireless and Mobile Networks.(Research Group website: http://mimoza.marmara.edu.tr/~mujdat.soyturk/WiNS-RG/default.html) Sensor & Ad Hoc Networks
Current institution
Marmara University
Current position
  • V2X Communications
Additional affiliations
November 2012 - present
Marmara University
Position
  • Professor (Assistant)
May 2007 - November 2012
Istanbul Technical University
August 2008 - April 2012
Naval Academy
Position
  • Asst.Prof.
Education
December 2008 - June 2009
Naval Postgraduate School
Field of study
  • C4I Systems
October 2002 - July 2007
Istanbul Technical University
Field of study
  • Computer Engineering
October 1999 - June 2002
Istanbul Technical University
Field of study
  • Computer Engineering

Publications

Publications (53)
Chapter
Full-text available
Vehicular networks are inseparable components of a smart city environment due to several applications that improve the quality of life, safety, and security. Applications of vehicular networks vary from safety applications such as blind spot warning and traffic light violations to entertainment such as streaming media or convenience such as parking...
Article
Full-text available
This paper presents an overview of how Artificial Intelligence (AI) and edge technology have been used to improve wireless connectivity in multiple industrial Use Cases (UCs) of the EU project “Intelligent Secure Trustable Things” (InSecTT). We present a brief introduction of the InSecTT framework for crossdomain architecture design, which targets...
Article
Full-text available
With the advent of 5G, there has been a significant surge in the deployment of Internet of Things (IoT) devices. This proliferation, while promising, has simultaneously highlighted crucial security vulnerabilities of IoT devices due to their inherent lack of robust security features. This research focuses on enhancing the security of the IoT ecosys...
Chapter
Full-text available
This chapter discusses modern smart manufacturing systems, the challenges in building such systems, and their vulnerabilities due to the lack of security features. The manufacturing industry has been revolutionized by the rapid growth of Wireless Sensor Networks (WSN) and the Internet of Things (IoT). Today, smart manufacturing systems are essentia...
Article
Full-text available
The Internet of Things (IoT) is increasingly used in every application field. Wi-Fi-based communication is the most preferred choice in wireless IoT systems due to its accessibility, high bandwidth, affordability, and versatility. However, security vulnerabilities in IoT devices pose considerable risks, especially in industrial and critical applica...
Chapter
Full-text available
The exponential growth of data in this digital age has necessitated advanced methodologies to effectively manage, process, and analyze vast datasets. The convergence of big data and AI presents a transformative opportunity across various sectors, yet it poses unique challenges in managing the scale, speed, and complexity of data. This chapter provi...
Chapter
In this chapter, the past and present situations of the reliability domain are discussed. As of today, most industries are in the transfer from test-to-pass approaches to more advanced strategies. These strategies currently are to determine the reliability capability by applying (where possible) the test-to-failure concept, extending reliability qu...
Chapter
The future of reliability is bright as each electronics company is spending 1–5% of their annual sales on cost of non-quality. These costs are related to product failures prior to the end of its warranty period. If even a portion of these costs are reduced, it would result in a substantial profit increase. Progress in the area of reliability can be...
Article
Full-text available
div>The United Nation Economic Commission for Europe (UNECE) Regulation 155—Cybersecurity and Cybersecurity Management System (UN R155) mandates the development of cybersecurity management systems (CSMS) as part of a vehicle’s lifecycle. An inherent component of the CSMS is cybersecurity risk management and assessment. Validation and verification t...
Conference Paper
Full-text available
The future of goods transportation will rely on increased efficiency, lower risks, and diminished delays through the use of vehicle platoons that benefit from vehicular connectivity using V2X (Vehicle to Everything) applications. This article describes a system that offers the aforementioned vehicular connectivity to platoons, based on AI-enhanced...
Conference Paper
Full-text available
Abstract-The proliferation of Internet of Things (IoT) applications across various domains has raised concerns about the security of wireless communication, particularly against jamming attacks. This paper presents an in-depth analysis of four jamming attack types-constant, random, pulsed, and barrage-on IoT network performance in noisy and noisele...
Preprint
Full-text available
DECICE is a Horizon Europe project that is developing an AI-enabled open and portable management framework for automatic and adaptive optimization and deployment of applications in computing continuum encompassing from IoT sensors on the Edge to large-scale Cloud / HPC computing infrastructures. In this paper, we describe the DECICE framework and a...
Article
Full-text available
IoT-based networks are vulnerable to jamming attacks due to their large-scale deployment and shared communication environment. Resource constraints and the low computational power of IoT devices make it harder to implement high-performance ML-based architectures for jamming detection. In this work, the effects of jamming attacks on a Wi-Fi network...
Conference Paper
Vehicle platooning is one of the important V2X applications for automated and connected cars. It provides various benefits including low CO2 emissions and low fuel consumption in addition to traffic efficiency and safety. However, due the short distances between the vehicles and the obstacles in the environment, the communication reliability become...
Conference Paper
Many devices and systems perform a specific function by working with position data obtained from GPS/GNSS receivers in NMEA 0183 or a similar format. In the testing phase of these devices and systems, position data is usually artificially produced and fed to the systems, so that systems can be tested based on variable positioning information. This...
Conference Paper
Full-text available
Building on many discoveries and inventions, electronics started affecting people’s everyday lives in a significant fashion following the invention of the first solid state transistor in late 1940s. The miniaturization paved way for the mass electronics production and later the digital revolution, the outcomes of which are visible to all members of...
Article
Full-text available
Sensor nodes in a Wireless Sensor Network (WSN) can be dispersed over a remote sensing area (e.g., the regions that are hardly accessed by human beings). In such kinds of networks, data collection becomes one of the major issues. Getting connected to each sensor node and retrieving the information in time introduces new challenges. Mobile sink usag...
Conference Paper
Sensor nodes in a Wireless Sensor Network (WSN) can be dispersed over a remote sensing area e.g. the regions that cannot be accessed by human beings (inaccessible regions). In such kind of networks, data collection becomes one of the major issues. Getting connected to each sensor node and retrieving the information in time introduces new challenges...
Article
Canonical Algorithms, Adaptive Algorithms, One-Max Problem, Rastrigin’s Function, Genetic Algorithms, Evolutionary algorithms
Conference Paper
Full-text available
Clustering algorithms improve network manage-ability through several topology partitioning techniques. In some particular cases, such as vehicular ad hoc network (VANETs) communications, significant performance improvements can be introduced via clustered networking solutions whereas merging clusters for the sake of scalability may lead to degraded...
Article
There is a number of ways to estimate the number of people in a particular area. From image processing to movement pattern analysis, the sheer number of methods exist in the literature. An interesting one among these methods is the one estimating with the use of signal processing. Because it is much cheaper compared to the other methods in the lite...
Conference Paper
Full-text available
Abstract—In this study, the road surface irregularities (pits, bumps, holes, speed breakers, etc.) is intended to be detected and identified with a system to be placed on the vehicles. For this purpose; a vibration-sensitive system is designed consisting of sensors, processor, and GPS receiver as hardware and the algorithms to be used for analyzing...
Article
Full-text available
Wireless Sensor Networks consist of battery-limited sensor nodes which have the ability of sensing the environment, communicating with other nodes and processing the data. Large number of sensor node deployment over a geographical area imposes some constraints on the retrieval of the data. The use of mobile sinks (e.g., Unmanned Aerial Vehicle, UAV...
Article
Full-text available
Resource limitations of sensor nodes in wireless sensor networks (WSN) bound the performance on its implementations. Main concern becomes utilizing these limited resources (CPU, memory, bandwidth, battery) as efficient as possible. Their efficiency is mostly affected by the applied routing algorithm, which carries gathered data to inclined/intended...
Article
Full-text available
The packet delivery ratio and throughput in Vehicular Ad Hoc Networks (VANETs) depend on the network connectivity and degrade as the connectivity decreases. A delay-tolerant approach increases the packet delivery ratio in partially connected networks. In the previous studies, the packet lifetime and the vehicle's packet carry time are determined to...
Conference Paper
Full-text available
Classical ad-hoc network algorithms become impractical for Vehicular Ad Hoc Networks when density of vehicles is low in rural areas and during the periods when the vehicle traffic is low in cities (such as at night). End-to-end connectivity requirement of these algorithms causes deflection. Connections get broken when a suitable network element isn...
Article
Low density of vehicles in rural areas and during the periods when the vehicle traffic is low in cities (such as at night) makes the classical ad-hoc network algorithms impractical for Vehicular Ad Hoc Networks. End-to-end connectivity requirement of these algorithms causes this deflection. Connections get broken when a suitable network element isn...
Conference Paper
Full-text available
The nature of military operations introduces additional requirements on sensor and ad-hoc networks such as reliability and operating in real-time. Although there has been many techniques providing reliability and real-time data communication in the literature, their implementations challenge with resource limitations peculiar to Wireless Sensor Net...
Conference Paper
Full-text available
In wireless sensor networks, energy-aware and network-lifetime prolonging techniques are proposed, as the energy becomes the most valuable resource. Most of these techniques use complex calculations failing to be easy to implement. Another approach is to use mobile-sink node to enhance the performance metrics. However, these techniques are not scal...
Conference Paper
Full-text available
In this paper, we propose a void avoidance algorithm for the stateless weight routing (SWR) algorithm which was developed stateless geographical routing protocol for wireless sensor and ad hoc networks. In order to demonstrate the efficiency of the method we started with the illustration of transmission coverage of relay nodes during the course of...
Conference Paper
Full-text available
As the energy becomes the most valuable resource in the wireless sensor networks, to prolong the lifetime of the network, energy-aware protocols are proposed which use the energy minimization techniques and multi-hop paths. However, multi-hop paths and complex calculations at nodes introduce delay and processing overhead. Providing energy-efficienc...
Conference Paper
Full-text available
A novel source-initiated geographical data flow technique, called stateless weighted routing (SWR), is presented in this paper. Nodes keep only their own virtual geographical position and require no local topological information. Each node calculates the weight of its own. Initially, this value is its relative distance to the sink. Each node decide...
Conference Paper
Full-text available
A virtual cell layout (VCL) based dynamic source routing (VB-DSR) technique is introduced for the mobile subsystem of the next generation tactical communications systems. VB-DSR uses a dynamic source routing (DSR) protocol over the VCL structure, which is a resource management and clustering technique for tactical communications. The application of...
Article
Full-text available
Technological advances in wireless communications and nanotechnologies made use of sensor-involved applications and systems for homeland security and safety more appealing. Application area can be extended from battlefield or security applications such as target detection to humanitarian applications such as disaster recovery, pollution detection,...
Article
Full-text available
Wireless Local Area Networks (WLANs) provide cost-effectiveness and flexibility to the network and provide mobility to the network users. However, there are potential problems due to wireless communications and applied security protocols. In this paper, the security mechanisms and protocols for wireless local area networks; WEP and IEEE 802.11i are...

Network

Cited By