CFP last date
20 May 2024
Reseach Article

Architecture for Application Autonomic Protection Principles in Wireless Sensor Network

by Hosam Soleman, Ali Payandeh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 64 - Number 6
Year of Publication: 2013
Authors: Hosam Soleman, Ali Payandeh
10.5120/10642-5399

Hosam Soleman, Ali Payandeh . Architecture for Application Autonomic Protection Principles in Wireless Sensor Network. International Journal of Computer Applications. 64, 6 ( February 2013), 37-42. DOI=10.5120/10642-5399

@article{ 10.5120/10642-5399,
author = { Hosam Soleman, Ali Payandeh },
title = { Architecture for Application Autonomic Protection Principles in Wireless Sensor Network },
journal = { International Journal of Computer Applications },
issue_date = { February 2013 },
volume = { 64 },
number = { 6 },
month = { February },
year = { 2013 },
issn = { 0975-8887 },
pages = { 37-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume64/number6/10642-5399/ },
doi = { 10.5120/10642-5399 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:15:44.370528+05:30
%A Hosam Soleman
%A Ali Payandeh
%T Architecture for Application Autonomic Protection Principles in Wireless Sensor Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 64
%N 6
%P 37-42
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless sensor networks (WSNs) as an emerging technology face numerous challenges. Sensor nodes are usually resources constrained,also, they are vulnerable to physical attacks or node compromises. Autonomic Computing is a steadily emerging and promising research field. In the domain of simplifying interoperability, it aims to diminish the management complexity in several industries and systems. Self-protection in WSNshasn't been deeply studied before, because ofthe high rate of fails. The major concern in WSN is to maximize the network's Lifetime. In this paper,a framework that embeds autonomic capabilities into WSN systems is proposed. The proposed framework provides self-protection features in cases of unauthorized, inadvertent and intentional change in security parameters.

References
  1. Lili Yang, "Determining Sink Node Locations in Wireless Sensor Networks", IEEE, pp3400-3404. 2006,
  2. Chien-Chung Shen ,ChaipornJaikaeo , Chavalit ," Sensor Network Architecture and Applications ", IEEE Personal Communications Magazine, 2005.
  3. QutaibaIbrahem Ali, AkramAbdulmaowjod, Hussein Mahmood Mohammed, "Simulation & Performance Study of Wireless Sensor Network (WSN) Using MATLAB", IEEE, pp307-314. 2010,
  4. Kurak, C and McHugh, J, "A Cautionary Note on Image Downgrading in Computer Security Applications", Proceedings of the 8th Computer Security Applications Conference, San Antonio, December, pp. 153-159. 1992.
  5. Mokowitz, I. S. , Longdon, G. E. , and Chang, L. , "A New Paradigm Hidden in Steganography", Proc. of the 2000 workshop on New security paradigms, Ballycotton, County Cork, Ireland, pp. 41 – 50. 2001.
  6. A Practical Guide to the IBM Autonomic Computing Toolkit (Red Book).
  7. Undercoffer, J. , Avancha, S. , Joshi, A. , and Pinkston, J. , "Security for Sensor Networks", CADIP Research Symposium, 2002, available at, http://www. cs. sfu. ca/~angiez/personal/paper/sensor-ids. pdf.
  8. Jolly, G. , Kuscu, M. C. , Kokate, P. , and Younis, M. , "A Low-Energy Key Management Protocol for Wireless Sensor Networks", Proc. Eighth IEEE International Symposium on Computers and Communication, 2003. (ISCC 2003). vol. 1, pp. 335 – 340.
  9. Rabaey, J. M. , Ammer, J. , Karalar, T. , Suetfei Li. , Otis, B. , Sheets, M. , and Tuan, T. , "PicoRadios for wireless sensor networks: the next challenge in ultra-low power design" IEEE International Solid-State Circuits Conference (ISSCC 2002), Volume 1, 3-7 Feb. , pp. 200 – 210.
  10. Kim, C. H. , O, S. C. , Lee, S. , Yang, W. I. , and Lee, H-W. , "Steganalysis on BPCS Steganography", Pacific Rim Workshop on Digital Steganography (STEG'03), July 3-4, Japan, 2003.
  11. Orihashi, M. , Nakagawa, Y. , Murakami, Y. , and Kobayashi, K. , "Channel synthesized modulation employing singular vector for secured access on physical layer", IEEE GLOBECOM 2003, Volume 3, 1-5 December, pp. 1226 – 1230. 2003.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless sensor network Autonomic system self-protection structure