Architecture for Application Autonomic Protection Principles in Wireless Sensor Network

Wireless sensor networks (WSNs) as an emerging technology face numerous challenges. Sensor nodes are usually resources constrained,also, they are vulnerable to physical attacks or node compromises. Autonomic Computing is a steadily emerging and promising research field. In the domain of simplifying interoperability, it aims to diminish the management complexity in several industries and systems. Self-protection in WSNshasn’t been deeply studied before, because ofthe high rate of fails. The major concern in WSN is to maximize the network’s Lifetime.In this paper,a framework that embeds autonomic capabilities into WSN systems is proposed. The proposed framework provides self-protection features in cases of unauthorized, inadvertent and intentional change in security parameters.

[1]  Lili Yang Determining Sink Node Locations in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Systems, Man and Cybernetics.

[2]  Mohamed F. Younis,et al.  A low-energy key management protocol for wireless sensor networks , 2003, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003.

[3]  Chien-Chung Shen,et al.  Sensor information networking architecture and applications , 2001, IEEE Wirel. Commun..

[4]  B. Otis,et al.  PicoRadios for wireless sensor networks: the next challenge in ultra-low power design , 2002, 2002 IEEE International Solid-State Circuits Conference. Digest of Technical Papers (Cat. No.02CH37315).

[5]  Qutaiba Ibrahem Ali,et al.  Simulation & performance study of wireless sensor network (WSN) using MATLAB , 2010, 2010 1st International Conference on Energy, Power and Control (EPC-IQ).

[6]  John McHugh,et al.  A cautionary note on image downgrading , 1992, [1992] Proceedings Eighth Annual Computer Security Application Conference.

[7]  Martina Zitterbart,et al.  Security in Sensor Networks , 2010, it Inf. Technol..

[8]  Chien-Chung Shen,et al.  Sensor Network Architecture and Applications , 2004, Handbook of Sensor Networks.

[9]  Anupam Joshi,et al.  Security in Sensor Networks , 2020, Texts in Computer Science.

[10]  Ira S. Moskowitz,et al.  A new paradigm hidden in steganography , 2001, NSPW '00.

[11]  Yutaka Murakami,et al.  Channel synthesized modulation employing singular vector for secured access on physical layer , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).