Research Article

Architecture for Application Autonomic Protection Principles in Wireless Sensor Network

by  Hosam Soleman, Ali Payandeh
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 64 - Issue 6
Published: February 2013
Authors: Hosam Soleman, Ali Payandeh
10.5120/10642-5399
PDF

Hosam Soleman, Ali Payandeh . Architecture for Application Autonomic Protection Principles in Wireless Sensor Network. International Journal of Computer Applications. 64, 6 (February 2013), 37-42. DOI=10.5120/10642-5399

                        @article{ 10.5120/10642-5399,
                        author  = { Hosam Soleman,Ali Payandeh },
                        title   = { Architecture for Application Autonomic Protection Principles in Wireless Sensor Network },
                        journal = { International Journal of Computer Applications },
                        year    = { 2013 },
                        volume  = { 64 },
                        number  = { 6 },
                        pages   = { 37-42 },
                        doi     = { 10.5120/10642-5399 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2013
                        %A Hosam Soleman
                        %A Ali Payandeh
                        %T Architecture for Application Autonomic Protection Principles in Wireless Sensor Network%T 
                        %J International Journal of Computer Applications
                        %V 64
                        %N 6
                        %P 37-42
                        %R 10.5120/10642-5399
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless sensor networks (WSNs) as an emerging technology face numerous challenges. Sensor nodes are usually resources constrained,also, they are vulnerable to physical attacks or node compromises. Autonomic Computing is a steadily emerging and promising research field. In the domain of simplifying interoperability, it aims to diminish the management complexity in several industries and systems. Self-protection in WSNshasn't been deeply studied before, because ofthe high rate of fails. The major concern in WSN is to maximize the network's Lifetime. In this paper,a framework that embeds autonomic capabilities into WSN systems is proposed. The proposed framework provides self-protection features in cases of unauthorized, inadvertent and intentional change in security parameters.

References
  • Lili Yang, "Determining Sink Node Locations in Wireless Sensor Networks", IEEE, pp3400-3404. 2006,
  • Chien-Chung Shen ,ChaipornJaikaeo , Chavalit ," Sensor Network Architecture and Applications ", IEEE Personal Communications Magazine, 2005.
  • QutaibaIbrahem Ali, AkramAbdulmaowjod, Hussein Mahmood Mohammed, "Simulation & Performance Study of Wireless Sensor Network (WSN) Using MATLAB", IEEE, pp307-314. 2010,
  • Kurak, C and McHugh, J, "A Cautionary Note on Image Downgrading in Computer Security Applications", Proceedings of the 8th Computer Security Applications Conference, San Antonio, December, pp. 153-159. 1992.
  • Mokowitz, I. S. , Longdon, G. E. , and Chang, L. , "A New Paradigm Hidden in Steganography", Proc. of the 2000 workshop on New security paradigms, Ballycotton, County Cork, Ireland, pp. 41 – 50. 2001.
  • A Practical Guide to the IBM Autonomic Computing Toolkit (Red Book).
  • Undercoffer, J. , Avancha, S. , Joshi, A. , and Pinkston, J. , "Security for Sensor Networks", CADIP Research Symposium, 2002, available at, http://www. cs. sfu. ca/~angiez/personal/paper/sensor-ids. pdf.
  • Jolly, G. , Kuscu, M. C. , Kokate, P. , and Younis, M. , "A Low-Energy Key Management Protocol for Wireless Sensor Networks", Proc. Eighth IEEE International Symposium on Computers and Communication, 2003. (ISCC 2003). vol. 1, pp. 335 – 340.
  • Rabaey, J. M. , Ammer, J. , Karalar, T. , Suetfei Li. , Otis, B. , Sheets, M. , and Tuan, T. , "PicoRadios for wireless sensor networks: the next challenge in ultra-low power design" IEEE International Solid-State Circuits Conference (ISSCC 2002), Volume 1, 3-7 Feb. , pp. 200 – 210.
  • Kim, C. H. , O, S. C. , Lee, S. , Yang, W. I. , and Lee, H-W. , "Steganalysis on BPCS Steganography", Pacific Rim Workshop on Digital Steganography (STEG'03), July 3-4, Japan, 2003.
  • Orihashi, M. , Nakagawa, Y. , Murakami, Y. , and Kobayashi, K. , "Channel synthesized modulation employing singular vector for secured access on physical layer", IEEE GLOBECOM 2003, Volume 3, 1-5 December, pp. 1226 – 1230. 2003.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Wireless sensor network Autonomic system self-protection structure

Powered by PhDFocusTM