Skip to main content

Autonomic Sensing

  • Chapter
  • First Online:
Body Sensor Networks

Abstract

In most engineering problems, our main concern is the exact specification and modelling of a system’s architecture and its associated responses. In this way, we can discover whether the analytical solution is tractable and practical. For complex systems, however, this is not always possible and the use of bio-inspired design provides a way of imitating how biological systems adapt to complex, dynamic and rapidly changing environments.

Natural selection has shown the weakness of distinct creatures and strengths of surviving species. To survive, animals, insects and even microorganisms are constantly competing for their lives. Despite the innate abilities of hunting for food and avoidance from predators, natural behaviours, such as social interactions, and the formation of societies are all effective survival tools. Through millions years of evolution, species have evolved to adapt to complex, competitive and dynamic environments. From anatomical and immunological properties, to those that are neurological and behavioural, nature and biology have inspired numerous innovations including the musculoskeletal humanoid, the immune network theory, artificial intelligence and quorum sensing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 119.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. H. Ellis, Clinical anatomy: a revision and applied anatomy for clinical students, 10th ed., 2002.

    Google Scholar 

  2. D. Male, J. Brostoff, D. B. Roth, and I. M. Roitt, Immunology, 8 ed.: Elsevier Ltd, 2012.

    Google Scholar 

  3. D. Male, Immunology – an illustrated outline, 4 ed.: Mosby, Elsevier Science Limited, 2004.

    Google Scholar 

  4. D. D. Chaplin, “Overview of the immune response,” Journal of Allergy and Clinical Immunology, vol. 125, pp. S3–S23, 2010.

    Article  Google Scholar 

  5. J. O. Kephart and D. M. Chess. (January 2003) The vision of autonomic computing. IEEE Computer Magazine. 41–50.

    Google Scholar 

  6. J. O. Kephart and D. M. Chess, “The vision of autonomic computing,” Computer, vol. 36, pp. 41–50, 2003.

    Article  Google Scholar 

  7. R. Murch, Autonomic Computing, 1 ed.: IBM Press, 2004.

    Google Scholar 

  8. V. Venkatasubramanian, R. Rengaswamy, K. Yin, and S. N. Kavuri, “A review of process fault detection and diagnosis. Part I: Quantitative model-based methods,” Computers and Chemical Engineering, vol. 27, pp. 293–311, 2003.

    Article  Google Scholar 

  9. A. A. Lazar, W. Wang, and R. H. Deng, “Models and algorithms for network fault detection and identification: a review,” in Singapore International Conference on Communications/International Symposium on Information Theory and Its Applications, ed, 1992, pp. 9999–1003.

    Google Scholar 

  10. L. Kant, A. S. Sethi, and M. Steinder, “Fault localization and self-healing mechanisms for FCS networks,” in the Twenty-Third Army Science Conference, Orlando, Florida, 2002.

    Google Scholar 

  11. F. R. Kschischang, B. J. Frey, and H.-A. Loeliger, “Factor graphs and the sum-product algorithm,” IEEE Transactions on Information Theory, Special Issue on Codes on Graphs and Iterative Algorithms, vol. 47, pp. 498–519, 2001.

    Article  MATH  MathSciNet  Google Scholar 

  12. B. J. Frey, “Extending factor graphs so as to unify directed and undirected graphical models,” in the Nineteenth Conference on Uncertainty in Artificial Intelligence, Acapulco, Mexico, 2003.

    Google Scholar 

  13. J. H. Kim and J. Pearl, “A computational model for causal and diagnostic reasoning in inference engines,” in the Eighth International Joint Conference on Artificial Intelligence, Karlsruhe, West Germany, 1983, pp. 190–193.

    Google Scholar 

  14. J. Pearl, “A constraint-propagation approach to probabilistic reasoning,” in the First Annual Conference on Uncertainty in Artificial Intelligence, Rome, New York, USA, 1985, pp. 357–370.

    Google Scholar 

  15. J. Pearl, Probabilistic reasoning in intelligent systems: networks of plausible inference: Morgan Kaufmann, 1988.

    Google Scholar 

  16. G. F. Cooper, “The computational complexity of probabilistic inferences,” Artificial Intelligence, vol. 42, pp. 393–405, 1990.

    Article  MATH  MathSciNet  Google Scholar 

  17. J. Pearl, Probabilistic reasoning in intelligent systems: networks of plausible inference. San Mateo, CA: Morgan Kaufmann, 1988.

    Google Scholar 

  18. K. Murphy. (1998). A brief introduction to graphical models and Bayesian networks. Available: http://www.cs.ubc.ca/~murphyk/Bayes/bayes_tutorial.pdf

  19. C. K. Chow and C. N. Liu, “Approximating discrete probability distribution with dependence trees,” IEEE Transactions on Information Theory, vol. IT-14, pp. 462–267, 1968.

    Article  Google Scholar 

  20. P. P. Shenoy and G. Shafer, “Propagating belief functions using local computations,” IEEE Expert, vol. 1, pp. 43–52, 1986.

    Article  Google Scholar 

  21. G. Shafer and P. P. Shenoy, “Probability propagation,” Annals of Mathematics and Artificial Intelligence, vol. 2, pp. 327–352, 1990.

    Article  MATH  MathSciNet  Google Scholar 

  22. P. P. Shenoy and G. Shafer, Axioms for probability and belief-function propagation. San Francisco, CA: Morgan Kaufmann, 1990.

    Google Scholar 

  23. F. V. Jensen, S. L. Lauritzen, and K. G. Olesen, “Bayesian updating in causal probabilistic networks by local computation,” Computational Statistics Quarterly, vol. 4, 1990.

    Google Scholar 

  24. S. Lauritzen and D. Spiegelhalter, “Local computations with probabilities on graphical structures and their application to expert systems,” Journal of the Royal Statistical Society B, 1988.

    Google Scholar 

  25. R. Dechter, “Bucket elimination: a unifying framework for several probabilistic inference algorithms,” in the Twelfth Conference on Uncertainty in Artificial Intelligence, Portland, Oregon, USA, 1996.

    Google Scholar 

  26. F. Cozman, “Generalizing variable elimination in Bayesian networks,” in Workshop on Probabilistic Reasoning in Artificial Intelligence, ed. Atibaia, Brazil, 2000.

    Google Scholar 

  27. R. Shachter, “Intelligent probabilistic inference,” in the First Annual Conference on Uncertainty in Artificial Intelligence, ed. UCLA, Los Angeles, CA, 1985.

    Google Scholar 

  28. R. Shachter, “Evidence absorption and propagation through evidence reversals,” in the Fifth Conference on Uncertainty in Artificial Intelligence, ed. University of Windsor, Ontario, 1989.

    Google Scholar 

  29. Z. Li and B. D’Ambrosio, “Efficient inference in Bayes network as a combinatorial optimization problem,” International Journal of Approximate Reasoning, vol. 11, 1994.

    Google Scholar 

  30. A. Darwiche, “A differential approach to inference in Bayesian networks,” in the Sixteenth Conference on Uncertainty in Artificial Intelligence, ed. Stanford, Palo Alto, CA, 2000.

    Google Scholar 

  31. R. D. Shachter and M. A. Peot, “Simulation approaches to general probabilistic inference on belief networks,” in the Fifth Conference on Uncertainty in Artificial Intelligence, University of Windsor, Ontario, 1989.

    Google Scholar 

  32. S. Geman and D. Geman, “Stochastic relaxation, Gibbs distribution and the Bayesian restoration of images,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 6, pp. 721–741, 1984.

    Article  MATH  Google Scholar 

  33. D. MacKay, “Introduction to Monte Carlo methods,” in Learning in Graphical Models, M. I. Jordan, Ed., ed: MIT Press, 1998.

    Google Scholar 

  34. H. J. S. H. Horvitz, and G. F. Cooper, “Bounded conditioning: flexible inference for decisions under scarce resources,” in the Fifth Conference on Uncertainty in Artificial Intelligence, ed. Windsor, Ontario, 1989.

    Google Scholar 

  35. R. Dechter, “Mini-buckets: a general scheme for generating approximations in automated reasoning in probabilistic inference,” in the Fifteenth International Joint Conference on Artificial Intelligence, Nagoya, Japan, 1997.

    Google Scholar 

  36. K. Murphy, Y. Weiss, and M. I. Jordan, “Loopy belief propagation for approximate inference: an empirical study,” in the Fifteenth Conference on Uncertainty in Artificial Intelligence, ed, 1999, pp. 467–475.

    Google Scholar 

  37. Y. Weiss, “Correctness of belief propagation in Gaussian graphical models of arbitrary topology,” Neural Computation, vol. 13, 2001.

    Google Scholar 

  38. M. J. Wainwrght and M. I. Jordan, “Graphical models, exponential families and variational inference,” University of California, Berkeley, Technical Report 649, 2003.

    Google Scholar 

  39. H. Guo and W. Hsu, “A survey of algorithms for real-time Bayesian network inference,” in Joint Workshop on Real-Time Decision Support and Diagnosis Systems, ed. Edmonton, Canada, 2002.

    Google Scholar 

  40. C.-K. Kwoh and D. F. Gillies, “Probabilistic reasoning and multiple-expert methodology for correlated objective data,” Artificial Intelligence in Engineering, vol. 12, pp. 21–33, 1998.

    Article  Google Scholar 

  41. C.-K. Kwoh and D. F. Gillies, “Using hidden nodes in Bayesian network,” Artificial Intelligence, vol. 88, pp. 1–38, 1996.

    Article  MATH  Google Scholar 

  42. M. Chu, S. K. Mitter, and F. Zhao, “An information architecture for distributed inference on ad hoc sensor networks,” in the Forty-First Annual Allerton Conference on Communication, Control, and Computing, ed. Monticello, IL, USA, 2003.

    Google Scholar 

  43. M. Alanyali, S. Venkatesh, O. Savas, and S. Aeron, “Distributed Bayesian hypothesis testing in sensor networks,” in the 2004 American Control Conference, 2004, pp. 5369–5374.

    Google Scholar 

  44. A. T. Ihler, J. W. Fisher, R. L. Moses, and A. S. Willsky, “Nonparametric belief propagation for sensor network self-calibration,” IEEE Journal on Selected Areas in Communications, 2005.

    Google Scholar 

  45. C. Crick and A. Pfeffer, “Loopy belief propagation as a basis for communication in sensor networks,” in the Nineteenth Conference on Uncertainty in Artificial Intelligence, Acapulco, Mexico, 2003.

    Google Scholar 

  46. M. A. Paskin, C. E. Guestrin, and J. McFadden, “A robust architecture for distributed inference in sensor networks,” in the Fourth International Symposium on Information Processing in Sensor Networks, 2005.

    Google Scholar 

  47. M. A. Paskin and C. E. Guestrin, “Robust probabilistic inference in distributed systems,” in the Twentieth ACM International Conference on Uncertainty in Artificial Intelligence, ed. Banff, Canada, 2004, pp. 436–445.

    Google Scholar 

  48. L. Atallah, D. McIlwraith, S. Thiemjarus, B. Lo, and G. Z. Yang, “Distributed inferencing with ambient and wearable sensors,” Wireless Communications and Mobile Computing, vol. 12, pp. 117–131, 2012.

    Article  Google Scholar 

  49. P. S. Hall and Y. Hao, Antennas and Propagation for Body-Centric Wireless Communications: Artech House Inc, 2006.

    Google Scholar 

  50. S. Thiemjarus, B. P. L. Lo, and G. Z. Yang, “A distributed Bayesian framework for body sensor networks,” in the Second International Workshop on Body Sensor Networks, Imperial College, London, 2005.

    Google Scholar 

  51. S. Thiemjarus, B. P. L. Lo, and G. Z. Yang, “A noise resilient distributed inference framework for body sensor networks,” in the Third International Conference on Pervasive Computing, ed. Munich, Germany, 2005, pp. 13–18.

    Google Scholar 

  52. E. Reusens, W. Joseph, B. Latré, B. Braem, G. Vermeeren, E. Tanghe, L. Martens, I. Moerman, and C. Blondia, “Characterization of on-body communication channel and energy efficient topology design for wireless body area networks,” Information Technology in Biomedicine, IEEE Transactions on, vol. 13, pp. 933–945, 2009.

    Article  Google Scholar 

  53. A. Natarajan, M. Motani, B. de Silva, K.-K. Yap, and K. C. Chua, “Investigating network architectures for body sensor networks,” in Proceedings of the 1st ACM SIGMOBILE international workshop on Systems and networking support for healthcare and assisted living environments, 2007, pp. 19–24.

    Google Scholar 

  54. A. Natarajan, B. de Silva, K.-K. Yap, and M. Motani, “Link layer behavior of body area networks at 2.4 ghz,” in Proceedings of the 15th annual international conference on Mobile computing and networking, 2009, pp. 241–252.

    Google Scholar 

  55. A. Natarajan, B. De Silva, K.-K. Yap, and M. Motani, “To hop or not to hop: Network architecture for body sensor networks,” in Sensor, Mesh and Ad Hoc Communications and Networks, 2009. SECON’09. 6th Annual IEEE Communications Society Conference on, 2009, pp. 1–9.

    Google Scholar 

  56. S. Ullah, H. Higgins, B. Braem, B. Latre, C. Blondia, I. Moerman, S. Saleem, Z. Rahman, and K. S. Kwak, “A comprehensive survey of wireless body area networks,” Journal of Medical Systems, vol. 36, pp. 1065–1094, 2012.

    Article  Google Scholar 

  57. B. Latré, B. Braem, I. Moerman, C. Blondia, and P. Demeester, “A survey on wireless body area networks,” Wireless Networks, vol. 17, pp. 1–18, 2011.

    Article  Google Scholar 

  58. A. M. Turing, “The chemical basis of morphogenesis,” Bulletin of mathematical biology, vol. 52, pp. 153–197, 1990.

    Article  Google Scholar 

  59. M. Durvy and P. Thiran, “Reaction-diffusion based transmission patterns for ad hoc networks,” in INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE, 2005, pp. 2195–2205.

    Google Scholar 

  60. A. Tyrrell, G. Auer, and C. Bettstetter, “Biologically inspired synchronization for wireless networks,” in Advances in Biologically Inspired Information Systems, ed: Springer, 2007, pp. 47–62.

    Google Scholar 

  61. J. Degesys, I. Rose, A. Patel, and R. Nagpal, “DESYNC: self-organizing desynchronization and TDMA on wireless sensor networks,” in Proceedings of the 6th international conference on Information processing in sensor networks, 2007, pp. 11–20.

    Google Scholar 

  62. J. Degesys and R. Nagpal, “Towards desynchronization of multi-hop topologies,” in Self-Adaptive and Self-Organizing Systems, 2008. SASO’08. Second IEEE International Conference on, 2008, pp. 129–138.

    Google Scholar 

  63. H. Hernández and C. Blum, “Distributed graph coloring: an approach based on the calling behavior of Japanese tree frogs,” Swarm Intelligence, vol. 6, pp. 117–150, 2012.

    Article  Google Scholar 

  64. R. E. Mirollo and S. H. Strogatz, “Synchronization of pulse-coupled biological oscillators,” SIAM Journal on Applied Mathematics, vol. 50, pp. 1645–1662, 1990.

    Article  MATH  MathSciNet  Google Scholar 

  65. R. Pagliari, Y.-W. Hong, and A. Scaglione, “Bio-inspired algorithms for decentralized round-robin and proportional fair scheduling,” Selected Areas in Communications, IEEE Journal on, vol. 28, pp. 564–575, 2010.

    Article  Google Scholar 

  66. R. Pagliari, A. Scaglione, and R. A. Tannious, “Design of a distributed protocol for proportional fairness in wireless body area networks,” in Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE, 2010, pp. 1–6.

    Google Scholar 

  67. R. A. Tannious and A. Scaglione, “Physical layer design of distributed proportional fair scheduling in wireless body area networks,” in Personal, Indoor and Mobile Radio Communications Workshops (PIMRC Workshops), 2010 I.E. 21st International Symposium on, 2010, pp. 78–83.

    Google Scholar 

  68. W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-efficient communication protocol for wireless microsensor networks,” in System Sciences, 2000. Proceedings of the 33rd Annual Hawaii International Conference on, 2000, p. 10 pp. vol. 2.

    Google Scholar 

  69. S. Lindsey and C. S. Raghavendra, “PEGASIS: Power-efficient gathering in sensor information systems,” in Aerospace conference proceedings, 2002. IEEE, 2002, pp. 3-1125–3-1130 vol. 3.

    Google Scholar 

  70. R. C. Shah and J. M. Rabaey, “Energy aware routing for low energy ad hoc sensor networks,” in Wireless Communications and Networking Conference, 2002. WCNC2002. 2002 IEEE, 2002, pp. 350–355.

    Google Scholar 

  71. A. Manjeshwar and D. P. Agrawal, “TEEN: A Routing Protocol for Enhanced Efficiency in Wireless Sensor Networks,” in IPDPS, 2001, p. 189.

    Google Scholar 

  72. A. Manjeshwar and D. P. Agrawal, “APTEEN: A Hybrid Protocol for Efficient Routing and Comprehensive Information Retrieval in Wireless Sensor Networks,” in ipdps, 2002, p. 48.

    Google Scholar 

  73. B. Braem, B. Latre, I. Moerman, C. Blondia, and P. Demeester, “The wireless autonomous spanning tree protocol for multihop wireless body area networks,” in Mobile and Ubiquitous Systems: Networking & Services, 2006 Third Annual International Conference on, 2006, pp. 1–8.

    Google Scholar 

  74. T. Watteyne, I. Augé-Blum, M. Dohler, and D. Barthel, “Anybody: a self-organization protocol for body area networks,” in Proceedings of the ICST 2nd international conference on Body area networks, 2007, p. 6.

    Google Scholar 

  75. X. Ji and H. Zha, “Sensor positioning in wireless ad hoc sensor networks using multidimensional scaling,” in the IEEE INFOCOM, 2004.

    Google Scholar 

  76. J. W. Sammon, “A nonlinear mapping for data structure analysis,” IEEE Transactions on Computers, vol. C-18, pp. 401–409, 1969.

    Article  Google Scholar 

  77. R. Yan, D. Ball, A. Deshmukh, and R. X. Gao, “A Bayesian network approach to energy-aware distributed sensing,” in Sensors, 2004. Proceedings of IEEE, 2004, pp. 44–47.

    Google Scholar 

  78. Y. Xiang, D. Poole, and M. P. Beddoes, “Multiply sectioned Bayesian networks and junction forests for large knowledge based systems,” Computational Intelligence, vol. 9, pp. 171–220, 1993.

    Article  Google Scholar 

  79. Y. Xiang and V. Lesser, “Justifying multiply sectioned Bayesian networks,” in the Fourth International Conference on Multi-Agent, Boston, 2000, pp. 349–356.

    Google Scholar 

  80. R. Yan, D. Ball, A. Deshmukh, and R. X. Gao, “A Bayesian network approach to energy-aware distributed sensing,” in IEEE Sensors Conference, Vienna, Austria, 2004, pp. 44–47.

    Google Scholar 

  81. F. Dressler, “Self-organized event detection in sensor networks using bio-inspired promoters and inhibitors,” in Proceedings of the 3rd International Conference on Bio-Inspired Models of Network, Information and Computing Systems, 2008, p. 10.

    Google Scholar 

  82. K. Lorincz, B.-r. Chen, G. W. Challen, A. R. Chowdhury, S. Patel, P. Bonato, and M. Welsh, “Mercury: a wearable sensor network platform for high-fidelity motion analysis,” in SenSys, 2009, pp. 183–196.

    Google Scholar 

  83. The BSN node. Available: http://ubimon.doc.ic.ac.uk/bsn/index.php?article=167

  84. L. N. De Castro and J. Timmis, Artificial immune systems: a new computational intelligence approach: Springer Verlag, 2002.

    Google Scholar 

  85. K. Akkaya and M. Younis, “A survey on routing protocols for wireless sensor networks,” Ad hoc networks, vol. 3, pp. 325–349, 2005.

    Article  Google Scholar 

  86. H. Karl and A. Willig, Protocols and architectures for wireless sensor networks. Chichester, West Sussex: John Wiley and Sons, 2005.

    Book  Google Scholar 

  87. A. Wood and J. Stankovic, “A taxonomy for denial-of-service attacks in wireless sensor networks,” in Handbook of Sensor Networks, M. Ilyas and I. Mahgoub, Eds., ed Boca Raton, Florida: CRC Press, 2005, pp. 32.1-32.20.

    Google Scholar 

  88. C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks an countermeasures,” in the First IEEE International Workshop on Sensor Network Protocols Applications, 2003.

    Google Scholar 

  89. J. R. Douceur, “The Sybil attack,” in the First International Workshop on Peer-to-Peer Systems, 2002.

    Google Scholar 

  90. Y. C. Hu, A. Perrig, and D. B. Johnson, “Wormhole detection in wireless ad hoc networks,” Department of Computer Science, Rice University, Technical Report TR01-384, 2002.

    Google Scholar 

  91. A. D. Wood and J. A. Stankovic, “A taxonomy for denial-of-service attacks in wireless sensor networks,” Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, pp. 739–763, 2004.

    Google Scholar 

  92. U. Cetintemel, A. Flinders, and Y. Sun, “Power-efficient data dissemination in wireless sensor networks,” in the Third International ACM Workshop on Data Engineering for Wireless and Mobile Access, San Diego, California, 2003.

    Google Scholar 

  93. J. W. Hui and D. Culler, “The dynamic behavior of a data dissemination protocol for network programming at scale,” in the Second ACM Conference on Embedded Networked Sensor Systems, ed. Baltimore, Maryland, USA, 2004.

    Google Scholar 

  94. A. Perrig, R. Szewczyk, V. Wen, S. Culler, and J. D. Tygar, “SPINS: security protocols for sensor networks,” in the Seventh Annual International Conference on Mobile Computing and Networking, Rome, Italy, 2001.

    Google Scholar 

  95. R. L. Rivest, “The RC5 encryption algorithm,” in the Second Workshop on Fast Software Encryption, ed, 1995, pp. 86–96.

    Google Scholar 

  96. A. Perrig, R. Canetti, J. D. Tygar, and D. Song, “Efficient authentication and signing of multicast streams over lossy channels,” in Security and Privacy, 2000. S&P 2000. Proceedings. 2000 I.E. Symposium on, 2000, pp. 56–73.

    Google Scholar 

  97. D. Liu and P. Ning, “Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks,” in the Tenth Symposium of Network Distributed System, Security, Internet Society, ed. Reston, VA, 2003.

    Google Scholar 

  98. W. Du, J. Deng, Y. Han, S. Chen, and P. Varshney, “A key management scheme for wireless sensor networks using deployment knowledge,” in IEEE INFOCOM, ed. Hong Kong, 2004.

    Google Scholar 

  99. D. Liu and P. Ning, “Establishing pairwise keys in distributed sensor networks,” in The Tenth ACM Conference on Computer and Communications Security, Washington D.C., 2003.

    Google Scholar 

  100. D. Liu and P. Ning, “Location-based pairwise key establishments for relatively static sensor networks,” in the 2003 ACM Workshop on Security of Ad Hoc and Sensor networks, ed. George W. Johnson Center at George Mason University, Fairfax., V.A., USA, 2003.

    Google Scholar 

  101. G. Eschenauer and D. Gligor, “A key management scheme for distributed sensor networks,” in the Ninth ACM Conference on Computer Communication Security, ed. New York, USA, 2002.

    Google Scholar 

  102. H. Chan, A. Perrig, and D. Song, “Random key predistribution schemes for sensor networks,” in IEEE Symposium of Security and Privacy, Los Alamitos, CA, 2003.

    Google Scholar 

  103. S. Slijepcevic, J. Wong, and M. Potkonjak, “Security and privacy protection in wireless sensor networks,” in Handbook of Sensor Networks: Compact Wireless and Wired Sensing System, M. Ilyas and I. Mahgoub, Eds., ed Florida, USA: CRC Press, 2004.

    Google Scholar 

  104. B. Arazi, I. Elhanany, O. Arazi, and H. Qi, “Revising public-key cryptography for wireless sensor networks,” IEEE Computer, vol. 3, pp. 103–105, 2005.

    Article  Google Scholar 

  105. D. Malan, M. Welsh, and M. D. Smith, “A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography,” in the First Annual IEEE Communication Society Conference on Sensor and Ad Hoc Communications and Networks, 2004, pp. 71–80.

    Google Scholar 

  106. C. S. Jang, D. G. Lee, J.-w. Han, and J. H. Park, “Hybrid security protocol for wireless body area networks,” Wireless Communications and Mobile Computing, vol. 11, pp. 277–288, 2011.

    Article  Google Scholar 

  107. R. Yasmin, E. Ritter, and G. Wang, “A pairing-free ID-based one-pass authenticated key establishment protocol for wireless sensor networks,” in SENSORCOMM 2011, The Fifth International Conference on Sensor Technologies and Applications, 2011, pp. 340–347.

    Google Scholar 

  108. U. Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain, “Biometric cryptosystems: issues and challenges,” Proceedings of the IEEE, vol. 92, pp. 948–960, 2004.

    Article  Google Scholar 

  109. S. Cherukuri, K. K. Venkatasubramanian, and S. K. Gupta, “BioSec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body,” in Parallel Processing Workshops, 2003. Proceedings. 2003 International Conference on, 2003, pp. 432–439.

    Google Scholar 

  110. J. Szczepanski, E. Wajnryb, J. M. Amigó, M. V. Sanchez-Vives, and M. Slater, “Biometric random number generators,” Computers & Security, vol. 23, pp. 77–84, 2004.

    Article  Google Scholar 

  111. S. M. K.-u.-R. Raazi, H. Lee, S. Lee, and Y.-K. Lee, “BARI+: A biometric based distributed key management approach for wireless body area networks,” Sensors, vol. 10, pp. 3911–3933, 2010.

    Article  Google Scholar 

  112. C. C. Poon, Y.-T. Zhang, and S.-D. Bao, “A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health,” Communications Magazine, IEEE, vol. 44, pp. 73–81, 2006.

    Article  Google Scholar 

  113. S.-D. Bao, C. C. Poon, Y.-T. Zhang, and L.-F. Shen, “Using the timing information of heartbeats as an entity identifier to secure body sensor network,” Information Technology in Biomedicine, IEEE Transactions on, vol. 12, pp. 772–779, 2008.

    Article  Google Scholar 

  114. K. K. Venkatasubramanian and S. K. Gupta, “Physiological value-based efficient usable security solutions for body sensor networks,” ACM Transactions on Sensor Networks (TOSN), vol. 6, p. 31, 2010.

    Article  Google Scholar 

  115. K. Cho and D. H. Lee, “Biometric based secure communications without pre-deployed key for biosensor implanted in body sensor networks,” in Information Security Applications, ed: Springer, 2012, pp. 203–218.

    Google Scholar 

  116. W. Wang, H. Wang, M. Hempel, D. Peng, H. Sharif, and H.-H. Chen, “Secure Stochastic ECG Signals Based on Gaussian Mixture Model for e-Healthcare Systems,” 2011.

    Google Scholar 

  117. K. K. Venkatasubramanian, A. Banerjee, and S. Gupta, “Plethysmogram-based secure inter-sensor communication in body area networks,” in Military Communications Conference, 2008. MILCOM 2008. IEEE, 2008, pp. 1–7.

    Google Scholar 

  118. K. K. Venkatasubramanian, A. Banerjee, and S. K. S. Gupta, “PSKA: usable and secure key agreement scheme for body area networks,” Information Technology in Biomedicine, IEEE Transactions on, vol. 14, pp. 60–68, 2010.

    Article  Google Scholar 

  119. G.-H. Zhang, C. C. Poon, and Y.-T. Zhang, “Analysis of Using Interpulse Intervals to Generate 128-Bit Biometric Random Binary Sequences for Securing Wireless Body Sensor Networks,” Information Technology in Biomedicine, IEEE Transactions on, vol. 16, pp. 176–182, 2012.

    Article  Google Scholar 

  120. A. Banerjee, K. Venkatasubramanian, and S. K. Gupta, “Challenges of implementing cyber-physical security solutions in body area networks,” in Proceedings of the Fourth International Conference on Body Area Networks, 2009, p. 18.

    Google Scholar 

  121. J. Inman, “The antibody combining region: speculations on the hypothesis of general multispecificity,” in Theoretical Immunology, G. Bell, A. Perelson, and G. Pimbley, Eds., ed: Marcel Dekker, 1978, pp. 234–278.

    Google Scholar 

  122. B. Rensberger, “ In self-defense,” in Life Itself, B. Rensberger, Ed., ed: Oxford University Press, 1996, pp. 212–228.

    Google Scholar 

  123. C. A. Janeway, P. Travers, M. Walport, and J. D. Capra, Immunobiology: the immune system in health and disease, 4th ed.: Garland Publishing, 1999.

    Google Scholar 

  124. S. A. Hofmeyr and S. Forrest, “Architecture for an artificial immune system,” Evolutionary Computation, vol. 7, pp. 45–68, 2000.

    Google Scholar 

  125. J. O. Kephart, “Biologically inspired immune system for computers,” in the Fourth International Workshop on Synthesis and Simulation of Living Systems, 1994, pp. 130–139.

    Google Scholar 

  126. S. Forrest, A. S. Perelson, L. Allen, and R. Cherukuri, “Self-nonself discrimination in a computer,” in IEEE Symposium on Research in Security and Privacy, 1994.

    Google Scholar 

  127. H. Nishiyama and F. Mizoguchi, “Design of security system based on immune system,” in the Tenth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, ed, 2001.

    Google Scholar 

  128. P. K. Harmer, P. D. Williams, G. H. Gunsch, and G. B. Lamont, “An artificial immune system architecture for computer security applications,” IEEE Transaction on Evolutionary Computation, vol. 6, pp. 252–280, 2002.

    Article  Google Scholar 

  129. D. Ma and G. Tsudik, “Dish: Distributed self-healing,” in Stabilization, Safety, and Security of Distributed Systems, ed: Springer, 2008, pp. 47–62.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guang-Zhong Yang PhD .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag London

About this chapter

Cite this chapter

Lo, B., Panousopoulou, A., Thiemjarus, S., Yang, GZ. (2014). Autonomic Sensing. In: Yang, GZ. (eds) Body Sensor Networks. Springer, London. https://doi.org/10.1007/978-1-4471-6374-9_10

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-6374-9_10

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-6373-2

  • Online ISBN: 978-1-4471-6374-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics