Abstract
In most engineering problems, our main concern is the exact specification and modelling of a system’s architecture and its associated responses. In this way, we can discover whether the analytical solution is tractable and practical. For complex systems, however, this is not always possible and the use of bio-inspired design provides a way of imitating how biological systems adapt to complex, dynamic and rapidly changing environments.
Natural selection has shown the weakness of distinct creatures and strengths of surviving species. To survive, animals, insects and even microorganisms are constantly competing for their lives. Despite the innate abilities of hunting for food and avoidance from predators, natural behaviours, such as social interactions, and the formation of societies are all effective survival tools. Through millions years of evolution, species have evolved to adapt to complex, competitive and dynamic environments. From anatomical and immunological properties, to those that are neurological and behavioural, nature and biology have inspired numerous innovations including the musculoskeletal humanoid, the immune network theory, artificial intelligence and quorum sensing.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
H. Ellis, Clinical anatomy: a revision and applied anatomy for clinical students, 10th ed., 2002.
D. Male, J. Brostoff, D. B. Roth, and I. M. Roitt, Immunology, 8 ed.: Elsevier Ltd, 2012.
D. Male, Immunology – an illustrated outline, 4 ed.: Mosby, Elsevier Science Limited, 2004.
D. D. Chaplin, “Overview of the immune response,” Journal of Allergy and Clinical Immunology, vol. 125, pp. S3–S23, 2010.
J. O. Kephart and D. M. Chess. (January 2003) The vision of autonomic computing. IEEE Computer Magazine. 41–50.
J. O. Kephart and D. M. Chess, “The vision of autonomic computing,” Computer, vol. 36, pp. 41–50, 2003.
R. Murch, Autonomic Computing, 1 ed.: IBM Press, 2004.
V. Venkatasubramanian, R. Rengaswamy, K. Yin, and S. N. Kavuri, “A review of process fault detection and diagnosis. Part I: Quantitative model-based methods,” Computers and Chemical Engineering, vol. 27, pp. 293–311, 2003.
A. A. Lazar, W. Wang, and R. H. Deng, “Models and algorithms for network fault detection and identification: a review,” in Singapore International Conference on Communications/International Symposium on Information Theory and Its Applications, ed, 1992, pp. 9999–1003.
L. Kant, A. S. Sethi, and M. Steinder, “Fault localization and self-healing mechanisms for FCS networks,” in the Twenty-Third Army Science Conference, Orlando, Florida, 2002.
F. R. Kschischang, B. J. Frey, and H.-A. Loeliger, “Factor graphs and the sum-product algorithm,” IEEE Transactions on Information Theory, Special Issue on Codes on Graphs and Iterative Algorithms, vol. 47, pp. 498–519, 2001.
B. J. Frey, “Extending factor graphs so as to unify directed and undirected graphical models,” in the Nineteenth Conference on Uncertainty in Artificial Intelligence, Acapulco, Mexico, 2003.
J. H. Kim and J. Pearl, “A computational model for causal and diagnostic reasoning in inference engines,” in the Eighth International Joint Conference on Artificial Intelligence, Karlsruhe, West Germany, 1983, pp. 190–193.
J. Pearl, “A constraint-propagation approach to probabilistic reasoning,” in the First Annual Conference on Uncertainty in Artificial Intelligence, Rome, New York, USA, 1985, pp. 357–370.
J. Pearl, Probabilistic reasoning in intelligent systems: networks of plausible inference: Morgan Kaufmann, 1988.
G. F. Cooper, “The computational complexity of probabilistic inferences,” Artificial Intelligence, vol. 42, pp. 393–405, 1990.
J. Pearl, Probabilistic reasoning in intelligent systems: networks of plausible inference. San Mateo, CA: Morgan Kaufmann, 1988.
K. Murphy. (1998). A brief introduction to graphical models and Bayesian networks. Available: http://www.cs.ubc.ca/~murphyk/Bayes/bayes_tutorial.pdf
C. K. Chow and C. N. Liu, “Approximating discrete probability distribution with dependence trees,” IEEE Transactions on Information Theory, vol. IT-14, pp. 462–267, 1968.
P. P. Shenoy and G. Shafer, “Propagating belief functions using local computations,” IEEE Expert, vol. 1, pp. 43–52, 1986.
G. Shafer and P. P. Shenoy, “Probability propagation,” Annals of Mathematics and Artificial Intelligence, vol. 2, pp. 327–352, 1990.
P. P. Shenoy and G. Shafer, Axioms for probability and belief-function propagation. San Francisco, CA: Morgan Kaufmann, 1990.
F. V. Jensen, S. L. Lauritzen, and K. G. Olesen, “Bayesian updating in causal probabilistic networks by local computation,” Computational Statistics Quarterly, vol. 4, 1990.
S. Lauritzen and D. Spiegelhalter, “Local computations with probabilities on graphical structures and their application to expert systems,” Journal of the Royal Statistical Society B, 1988.
R. Dechter, “Bucket elimination: a unifying framework for several probabilistic inference algorithms,” in the Twelfth Conference on Uncertainty in Artificial Intelligence, Portland, Oregon, USA, 1996.
F. Cozman, “Generalizing variable elimination in Bayesian networks,” in Workshop on Probabilistic Reasoning in Artificial Intelligence, ed. Atibaia, Brazil, 2000.
R. Shachter, “Intelligent probabilistic inference,” in the First Annual Conference on Uncertainty in Artificial Intelligence, ed. UCLA, Los Angeles, CA, 1985.
R. Shachter, “Evidence absorption and propagation through evidence reversals,” in the Fifth Conference on Uncertainty in Artificial Intelligence, ed. University of Windsor, Ontario, 1989.
Z. Li and B. D’Ambrosio, “Efficient inference in Bayes network as a combinatorial optimization problem,” International Journal of Approximate Reasoning, vol. 11, 1994.
A. Darwiche, “A differential approach to inference in Bayesian networks,” in the Sixteenth Conference on Uncertainty in Artificial Intelligence, ed. Stanford, Palo Alto, CA, 2000.
R. D. Shachter and M. A. Peot, “Simulation approaches to general probabilistic inference on belief networks,” in the Fifth Conference on Uncertainty in Artificial Intelligence, University of Windsor, Ontario, 1989.
S. Geman and D. Geman, “Stochastic relaxation, Gibbs distribution and the Bayesian restoration of images,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 6, pp. 721–741, 1984.
D. MacKay, “Introduction to Monte Carlo methods,” in Learning in Graphical Models, M. I. Jordan, Ed., ed: MIT Press, 1998.
H. J. S. H. Horvitz, and G. F. Cooper, “Bounded conditioning: flexible inference for decisions under scarce resources,” in the Fifth Conference on Uncertainty in Artificial Intelligence, ed. Windsor, Ontario, 1989.
R. Dechter, “Mini-buckets: a general scheme for generating approximations in automated reasoning in probabilistic inference,” in the Fifteenth International Joint Conference on Artificial Intelligence, Nagoya, Japan, 1997.
K. Murphy, Y. Weiss, and M. I. Jordan, “Loopy belief propagation for approximate inference: an empirical study,” in the Fifteenth Conference on Uncertainty in Artificial Intelligence, ed, 1999, pp. 467–475.
Y. Weiss, “Correctness of belief propagation in Gaussian graphical models of arbitrary topology,” Neural Computation, vol. 13, 2001.
M. J. Wainwrght and M. I. Jordan, “Graphical models, exponential families and variational inference,” University of California, Berkeley, Technical Report 649, 2003.
H. Guo and W. Hsu, “A survey of algorithms for real-time Bayesian network inference,” in Joint Workshop on Real-Time Decision Support and Diagnosis Systems, ed. Edmonton, Canada, 2002.
C.-K. Kwoh and D. F. Gillies, “Probabilistic reasoning and multiple-expert methodology for correlated objective data,” Artificial Intelligence in Engineering, vol. 12, pp. 21–33, 1998.
C.-K. Kwoh and D. F. Gillies, “Using hidden nodes in Bayesian network,” Artificial Intelligence, vol. 88, pp. 1–38, 1996.
M. Chu, S. K. Mitter, and F. Zhao, “An information architecture for distributed inference on ad hoc sensor networks,” in the Forty-First Annual Allerton Conference on Communication, Control, and Computing, ed. Monticello, IL, USA, 2003.
M. Alanyali, S. Venkatesh, O. Savas, and S. Aeron, “Distributed Bayesian hypothesis testing in sensor networks,” in the 2004 American Control Conference, 2004, pp. 5369–5374.
A. T. Ihler, J. W. Fisher, R. L. Moses, and A. S. Willsky, “Nonparametric belief propagation for sensor network self-calibration,” IEEE Journal on Selected Areas in Communications, 2005.
C. Crick and A. Pfeffer, “Loopy belief propagation as a basis for communication in sensor networks,” in the Nineteenth Conference on Uncertainty in Artificial Intelligence, Acapulco, Mexico, 2003.
M. A. Paskin, C. E. Guestrin, and J. McFadden, “A robust architecture for distributed inference in sensor networks,” in the Fourth International Symposium on Information Processing in Sensor Networks, 2005.
M. A. Paskin and C. E. Guestrin, “Robust probabilistic inference in distributed systems,” in the Twentieth ACM International Conference on Uncertainty in Artificial Intelligence, ed. Banff, Canada, 2004, pp. 436–445.
L. Atallah, D. McIlwraith, S. Thiemjarus, B. Lo, and G. Z. Yang, “Distributed inferencing with ambient and wearable sensors,” Wireless Communications and Mobile Computing, vol. 12, pp. 117–131, 2012.
P. S. Hall and Y. Hao, Antennas and Propagation for Body-Centric Wireless Communications: Artech House Inc, 2006.
S. Thiemjarus, B. P. L. Lo, and G. Z. Yang, “A distributed Bayesian framework for body sensor networks,” in the Second International Workshop on Body Sensor Networks, Imperial College, London, 2005.
S. Thiemjarus, B. P. L. Lo, and G. Z. Yang, “A noise resilient distributed inference framework for body sensor networks,” in the Third International Conference on Pervasive Computing, ed. Munich, Germany, 2005, pp. 13–18.
E. Reusens, W. Joseph, B. Latré, B. Braem, G. Vermeeren, E. Tanghe, L. Martens, I. Moerman, and C. Blondia, “Characterization of on-body communication channel and energy efficient topology design for wireless body area networks,” Information Technology in Biomedicine, IEEE Transactions on, vol. 13, pp. 933–945, 2009.
A. Natarajan, M. Motani, B. de Silva, K.-K. Yap, and K. C. Chua, “Investigating network architectures for body sensor networks,” in Proceedings of the 1st ACM SIGMOBILE international workshop on Systems and networking support for healthcare and assisted living environments, 2007, pp. 19–24.
A. Natarajan, B. de Silva, K.-K. Yap, and M. Motani, “Link layer behavior of body area networks at 2.4 ghz,” in Proceedings of the 15th annual international conference on Mobile computing and networking, 2009, pp. 241–252.
A. Natarajan, B. De Silva, K.-K. Yap, and M. Motani, “To hop or not to hop: Network architecture for body sensor networks,” in Sensor, Mesh and Ad Hoc Communications and Networks, 2009. SECON’09. 6th Annual IEEE Communications Society Conference on, 2009, pp. 1–9.
S. Ullah, H. Higgins, B. Braem, B. Latre, C. Blondia, I. Moerman, S. Saleem, Z. Rahman, and K. S. Kwak, “A comprehensive survey of wireless body area networks,” Journal of Medical Systems, vol. 36, pp. 1065–1094, 2012.
B. Latré, B. Braem, I. Moerman, C. Blondia, and P. Demeester, “A survey on wireless body area networks,” Wireless Networks, vol. 17, pp. 1–18, 2011.
A. M. Turing, “The chemical basis of morphogenesis,” Bulletin of mathematical biology, vol. 52, pp. 153–197, 1990.
M. Durvy and P. Thiran, “Reaction-diffusion based transmission patterns for ad hoc networks,” in INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE, 2005, pp. 2195–2205.
A. Tyrrell, G. Auer, and C. Bettstetter, “Biologically inspired synchronization for wireless networks,” in Advances in Biologically Inspired Information Systems, ed: Springer, 2007, pp. 47–62.
J. Degesys, I. Rose, A. Patel, and R. Nagpal, “DESYNC: self-organizing desynchronization and TDMA on wireless sensor networks,” in Proceedings of the 6th international conference on Information processing in sensor networks, 2007, pp. 11–20.
J. Degesys and R. Nagpal, “Towards desynchronization of multi-hop topologies,” in Self-Adaptive and Self-Organizing Systems, 2008. SASO’08. Second IEEE International Conference on, 2008, pp. 129–138.
H. Hernández and C. Blum, “Distributed graph coloring: an approach based on the calling behavior of Japanese tree frogs,” Swarm Intelligence, vol. 6, pp. 117–150, 2012.
R. E. Mirollo and S. H. Strogatz, “Synchronization of pulse-coupled biological oscillators,” SIAM Journal on Applied Mathematics, vol. 50, pp. 1645–1662, 1990.
R. Pagliari, Y.-W. Hong, and A. Scaglione, “Bio-inspired algorithms for decentralized round-robin and proportional fair scheduling,” Selected Areas in Communications, IEEE Journal on, vol. 28, pp. 564–575, 2010.
R. Pagliari, A. Scaglione, and R. A. Tannious, “Design of a distributed protocol for proportional fairness in wireless body area networks,” in Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE, 2010, pp. 1–6.
R. A. Tannious and A. Scaglione, “Physical layer design of distributed proportional fair scheduling in wireless body area networks,” in Personal, Indoor and Mobile Radio Communications Workshops (PIMRC Workshops), 2010 I.E. 21st International Symposium on, 2010, pp. 78–83.
W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-efficient communication protocol for wireless microsensor networks,” in System Sciences, 2000. Proceedings of the 33rd Annual Hawaii International Conference on, 2000, p. 10 pp. vol. 2.
S. Lindsey and C. S. Raghavendra, “PEGASIS: Power-efficient gathering in sensor information systems,” in Aerospace conference proceedings, 2002. IEEE, 2002, pp. 3-1125–3-1130 vol. 3.
R. C. Shah and J. M. Rabaey, “Energy aware routing for low energy ad hoc sensor networks,” in Wireless Communications and Networking Conference, 2002. WCNC2002. 2002 IEEE, 2002, pp. 350–355.
A. Manjeshwar and D. P. Agrawal, “TEEN: A Routing Protocol for Enhanced Efficiency in Wireless Sensor Networks,” in IPDPS, 2001, p. 189.
A. Manjeshwar and D. P. Agrawal, “APTEEN: A Hybrid Protocol for Efficient Routing and Comprehensive Information Retrieval in Wireless Sensor Networks,” in ipdps, 2002, p. 48.
B. Braem, B. Latre, I. Moerman, C. Blondia, and P. Demeester, “The wireless autonomous spanning tree protocol for multihop wireless body area networks,” in Mobile and Ubiquitous Systems: Networking & Services, 2006 Third Annual International Conference on, 2006, pp. 1–8.
T. Watteyne, I. Augé-Blum, M. Dohler, and D. Barthel, “Anybody: a self-organization protocol for body area networks,” in Proceedings of the ICST 2nd international conference on Body area networks, 2007, p. 6.
X. Ji and H. Zha, “Sensor positioning in wireless ad hoc sensor networks using multidimensional scaling,” in the IEEE INFOCOM, 2004.
J. W. Sammon, “A nonlinear mapping for data structure analysis,” IEEE Transactions on Computers, vol. C-18, pp. 401–409, 1969.
R. Yan, D. Ball, A. Deshmukh, and R. X. Gao, “A Bayesian network approach to energy-aware distributed sensing,” in Sensors, 2004. Proceedings of IEEE, 2004, pp. 44–47.
Y. Xiang, D. Poole, and M. P. Beddoes, “Multiply sectioned Bayesian networks and junction forests for large knowledge based systems,” Computational Intelligence, vol. 9, pp. 171–220, 1993.
Y. Xiang and V. Lesser, “Justifying multiply sectioned Bayesian networks,” in the Fourth International Conference on Multi-Agent, Boston, 2000, pp. 349–356.
R. Yan, D. Ball, A. Deshmukh, and R. X. Gao, “A Bayesian network approach to energy-aware distributed sensing,” in IEEE Sensors Conference, Vienna, Austria, 2004, pp. 44–47.
F. Dressler, “Self-organized event detection in sensor networks using bio-inspired promoters and inhibitors,” in Proceedings of the 3rd International Conference on Bio-Inspired Models of Network, Information and Computing Systems, 2008, p. 10.
K. Lorincz, B.-r. Chen, G. W. Challen, A. R. Chowdhury, S. Patel, P. Bonato, and M. Welsh, “Mercury: a wearable sensor network platform for high-fidelity motion analysis,” in SenSys, 2009, pp. 183–196.
The BSN node. Available: http://ubimon.doc.ic.ac.uk/bsn/index.php?article=167
L. N. De Castro and J. Timmis, Artificial immune systems: a new computational intelligence approach: Springer Verlag, 2002.
K. Akkaya and M. Younis, “A survey on routing protocols for wireless sensor networks,” Ad hoc networks, vol. 3, pp. 325–349, 2005.
H. Karl and A. Willig, Protocols and architectures for wireless sensor networks. Chichester, West Sussex: John Wiley and Sons, 2005.
A. Wood and J. Stankovic, “A taxonomy for denial-of-service attacks in wireless sensor networks,” in Handbook of Sensor Networks, M. Ilyas and I. Mahgoub, Eds., ed Boca Raton, Florida: CRC Press, 2005, pp. 32.1-32.20.
C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks an countermeasures,” in the First IEEE International Workshop on Sensor Network Protocols Applications, 2003.
J. R. Douceur, “The Sybil attack,” in the First International Workshop on Peer-to-Peer Systems, 2002.
Y. C. Hu, A. Perrig, and D. B. Johnson, “Wormhole detection in wireless ad hoc networks,” Department of Computer Science, Rice University, Technical Report TR01-384, 2002.
A. D. Wood and J. A. Stankovic, “A taxonomy for denial-of-service attacks in wireless sensor networks,” Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, pp. 739–763, 2004.
U. Cetintemel, A. Flinders, and Y. Sun, “Power-efficient data dissemination in wireless sensor networks,” in the Third International ACM Workshop on Data Engineering for Wireless and Mobile Access, San Diego, California, 2003.
J. W. Hui and D. Culler, “The dynamic behavior of a data dissemination protocol for network programming at scale,” in the Second ACM Conference on Embedded Networked Sensor Systems, ed. Baltimore, Maryland, USA, 2004.
A. Perrig, R. Szewczyk, V. Wen, S. Culler, and J. D. Tygar, “SPINS: security protocols for sensor networks,” in the Seventh Annual International Conference on Mobile Computing and Networking, Rome, Italy, 2001.
R. L. Rivest, “The RC5 encryption algorithm,” in the Second Workshop on Fast Software Encryption, ed, 1995, pp. 86–96.
A. Perrig, R. Canetti, J. D. Tygar, and D. Song, “Efficient authentication and signing of multicast streams over lossy channels,” in Security and Privacy, 2000. S&P 2000. Proceedings. 2000 I.E. Symposium on, 2000, pp. 56–73.
D. Liu and P. Ning, “Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks,” in the Tenth Symposium of Network Distributed System, Security, Internet Society, ed. Reston, VA, 2003.
W. Du, J. Deng, Y. Han, S. Chen, and P. Varshney, “A key management scheme for wireless sensor networks using deployment knowledge,” in IEEE INFOCOM, ed. Hong Kong, 2004.
D. Liu and P. Ning, “Establishing pairwise keys in distributed sensor networks,” in The Tenth ACM Conference on Computer and Communications Security, Washington D.C., 2003.
D. Liu and P. Ning, “Location-based pairwise key establishments for relatively static sensor networks,” in the 2003 ACM Workshop on Security of Ad Hoc and Sensor networks, ed. George W. Johnson Center at George Mason University, Fairfax., V.A., USA, 2003.
G. Eschenauer and D. Gligor, “A key management scheme for distributed sensor networks,” in the Ninth ACM Conference on Computer Communication Security, ed. New York, USA, 2002.
H. Chan, A. Perrig, and D. Song, “Random key predistribution schemes for sensor networks,” in IEEE Symposium of Security and Privacy, Los Alamitos, CA, 2003.
S. Slijepcevic, J. Wong, and M. Potkonjak, “Security and privacy protection in wireless sensor networks,” in Handbook of Sensor Networks: Compact Wireless and Wired Sensing System, M. Ilyas and I. Mahgoub, Eds., ed Florida, USA: CRC Press, 2004.
B. Arazi, I. Elhanany, O. Arazi, and H. Qi, “Revising public-key cryptography for wireless sensor networks,” IEEE Computer, vol. 3, pp. 103–105, 2005.
D. Malan, M. Welsh, and M. D. Smith, “A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography,” in the First Annual IEEE Communication Society Conference on Sensor and Ad Hoc Communications and Networks, 2004, pp. 71–80.
C. S. Jang, D. G. Lee, J.-w. Han, and J. H. Park, “Hybrid security protocol for wireless body area networks,” Wireless Communications and Mobile Computing, vol. 11, pp. 277–288, 2011.
R. Yasmin, E. Ritter, and G. Wang, “A pairing-free ID-based one-pass authenticated key establishment protocol for wireless sensor networks,” in SENSORCOMM 2011, The Fifth International Conference on Sensor Technologies and Applications, 2011, pp. 340–347.
U. Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain, “Biometric cryptosystems: issues and challenges,” Proceedings of the IEEE, vol. 92, pp. 948–960, 2004.
S. Cherukuri, K. K. Venkatasubramanian, and S. K. Gupta, “BioSec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body,” in Parallel Processing Workshops, 2003. Proceedings. 2003 International Conference on, 2003, pp. 432–439.
J. Szczepanski, E. Wajnryb, J. M. Amigó, M. V. Sanchez-Vives, and M. Slater, “Biometric random number generators,” Computers & Security, vol. 23, pp. 77–84, 2004.
S. M. K.-u.-R. Raazi, H. Lee, S. Lee, and Y.-K. Lee, “BARI+: A biometric based distributed key management approach for wireless body area networks,” Sensors, vol. 10, pp. 3911–3933, 2010.
C. C. Poon, Y.-T. Zhang, and S.-D. Bao, “A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health,” Communications Magazine, IEEE, vol. 44, pp. 73–81, 2006.
S.-D. Bao, C. C. Poon, Y.-T. Zhang, and L.-F. Shen, “Using the timing information of heartbeats as an entity identifier to secure body sensor network,” Information Technology in Biomedicine, IEEE Transactions on, vol. 12, pp. 772–779, 2008.
K. K. Venkatasubramanian and S. K. Gupta, “Physiological value-based efficient usable security solutions for body sensor networks,” ACM Transactions on Sensor Networks (TOSN), vol. 6, p. 31, 2010.
K. Cho and D. H. Lee, “Biometric based secure communications without pre-deployed key for biosensor implanted in body sensor networks,” in Information Security Applications, ed: Springer, 2012, pp. 203–218.
W. Wang, H. Wang, M. Hempel, D. Peng, H. Sharif, and H.-H. Chen, “Secure Stochastic ECG Signals Based on Gaussian Mixture Model for e-Healthcare Systems,” 2011.
K. K. Venkatasubramanian, A. Banerjee, and S. Gupta, “Plethysmogram-based secure inter-sensor communication in body area networks,” in Military Communications Conference, 2008. MILCOM 2008. IEEE, 2008, pp. 1–7.
K. K. Venkatasubramanian, A. Banerjee, and S. K. S. Gupta, “PSKA: usable and secure key agreement scheme for body area networks,” Information Technology in Biomedicine, IEEE Transactions on, vol. 14, pp. 60–68, 2010.
G.-H. Zhang, C. C. Poon, and Y.-T. Zhang, “Analysis of Using Interpulse Intervals to Generate 128-Bit Biometric Random Binary Sequences for Securing Wireless Body Sensor Networks,” Information Technology in Biomedicine, IEEE Transactions on, vol. 16, pp. 176–182, 2012.
A. Banerjee, K. Venkatasubramanian, and S. K. Gupta, “Challenges of implementing cyber-physical security solutions in body area networks,” in Proceedings of the Fourth International Conference on Body Area Networks, 2009, p. 18.
J. Inman, “The antibody combining region: speculations on the hypothesis of general multispecificity,” in Theoretical Immunology, G. Bell, A. Perelson, and G. Pimbley, Eds., ed: Marcel Dekker, 1978, pp. 234–278.
B. Rensberger, “ In self-defense,” in Life Itself, B. Rensberger, Ed., ed: Oxford University Press, 1996, pp. 212–228.
C. A. Janeway, P. Travers, M. Walport, and J. D. Capra, Immunobiology: the immune system in health and disease, 4th ed.: Garland Publishing, 1999.
S. A. Hofmeyr and S. Forrest, “Architecture for an artificial immune system,” Evolutionary Computation, vol. 7, pp. 45–68, 2000.
J. O. Kephart, “Biologically inspired immune system for computers,” in the Fourth International Workshop on Synthesis and Simulation of Living Systems, 1994, pp. 130–139.
S. Forrest, A. S. Perelson, L. Allen, and R. Cherukuri, “Self-nonself discrimination in a computer,” in IEEE Symposium on Research in Security and Privacy, 1994.
H. Nishiyama and F. Mizoguchi, “Design of security system based on immune system,” in the Tenth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, ed, 2001.
P. K. Harmer, P. D. Williams, G. H. Gunsch, and G. B. Lamont, “An artificial immune system architecture for computer security applications,” IEEE Transaction on Evolutionary Computation, vol. 6, pp. 252–280, 2002.
D. Ma and G. Tsudik, “Dish: Distributed self-healing,” in Stabilization, Safety, and Security of Distributed Systems, ed: Springer, 2008, pp. 47–62.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag London
About this chapter
Cite this chapter
Lo, B., Panousopoulou, A., Thiemjarus, S., Yang, GZ. (2014). Autonomic Sensing. In: Yang, GZ. (eds) Body Sensor Networks. Springer, London. https://doi.org/10.1007/978-1-4471-6374-9_10
Download citation
DOI: https://doi.org/10.1007/978-1-4471-6374-9_10
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-4471-6373-2
Online ISBN: 978-1-4471-6374-9
eBook Packages: Computer ScienceComputer Science (R0)