The document discusses applying autonomic computing principles to wireless sensor networks (WSNs). It introduces WSNs and their design goals/challenges, which include fault tolerance, power management, efficient routing and data aggregation. Autonomic computing aims to make systems self-configuring, self-healing, self-optimizing and self-protecting. The document argues that autonomic computing is well-suited for addressing WSN challenges by allowing for self-configuration, recovery from failures, optimized resource usage, and protection. It outlines architectures like MANNA that apply autonomic and service-oriented principles to provide a self-managing framework for WSNs.
Wireless sensor networks are made up of number of tiny mobile nodes, which
have the capability of computation, sensing and wireless network communication. The
energy efficiency of each node in such kind of networks is one of the important issues under
consideration. Thus for these networks, sensor nodes life time is basically depends on use of
routing protocols for routing operations in WSN. There are various routing protocols
proposed by different researchers, which are considered as efficient on the basis of
performance of network lifetime and energy scavenging. There are different routing
protocols introduced for WSN such as flat routing protocols, clustering routing protocols,
hierarchical routing protocols etc. On the other hand, there are basically two types of
WSNs, homogeneous and heterogeneous sensor networks. As WSN is vulnerable to different
types of security threats, there are many security methods presented with their own
advantages and disadvantages. Most of security methods are applied only on homogeneous
WSN, but recently some methods were presented to provide the routing security in
heterogeneous WSNs as well. In this paper, the different security threats and Intrusions in
WSNs are presented, with review of different security methods.
A Security Framework for Replication Attacks in Wireless Sensor NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksIDES Editor
Networks of wireless micro-sensors for monitoring
physical environments have emerged as an important new
application area for wireless technology. Key attributes of
these new types of networked systems are the severely
constrained computational and energy resources and an ad
hoc operational environment. This paper is a study of the
communication security aspects of these networks. Resource
limitations and specific architecture of sensor networks call
for customized security mechanisms. Our approach is to
classify the types of data existing in sensor networks, and
identify possible communication security threats according
to that classification. We propose a communication security
scheme where for each type of data we define a corresponding
security mechanism. By employing this multi-tiered security
architecture where each mechanism has different resource
requirements, we allow for efficient resource management,
which is essential for wireless sensor networks.
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...IJCNCJournal
With the growing usage of wireless sensors in a variety of applications including Internet of Things, the security aspects of wireless sensor networks have been on priority for the researchers. Due to the constraints of resources in wireless sensor networks, it has been always a challenge to design efficient security protocols for wireless sensor networks. An novel elliptic curve signcryption based security protocol for wireless sensor networks has been presented in this paper, which provides anonymity, confidentiality, mutual authentication, forward security, secure key establishment, and key privacy at the same time providing resistance from replay attack, impersonation attack, insider attack, offline dictionary attack, and stolen-verifier attack. Results have revealed that the proposed elliptic curve signcryption based protocol consumes the least time in comparison to other protocols while providing the highest level of security.
Wireless sensor networks are made up of number of tiny mobile nodes, which
have the capability of computation, sensing and wireless network communication. The
energy efficiency of each node in such kind of networks is one of the important issues under
consideration. Thus for these networks, sensor nodes life time is basically depends on use of
routing protocols for routing operations in WSN. There are various routing protocols
proposed by different researchers, which are considered as efficient on the basis of
performance of network lifetime and energy scavenging. There are different routing
protocols introduced for WSN such as flat routing protocols, clustering routing protocols,
hierarchical routing protocols etc. On the other hand, there are basically two types of
WSNs, homogeneous and heterogeneous sensor networks. As WSN is vulnerable to different
types of security threats, there are many security methods presented with their own
advantages and disadvantages. Most of security methods are applied only on homogeneous
WSN, but recently some methods were presented to provide the routing security in
heterogeneous WSNs as well. In this paper, the different security threats and Intrusions in
WSNs are presented, with review of different security methods.
A Security Framework for Replication Attacks in Wireless Sensor NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksIDES Editor
Networks of wireless micro-sensors for monitoring
physical environments have emerged as an important new
application area for wireless technology. Key attributes of
these new types of networked systems are the severely
constrained computational and energy resources and an ad
hoc operational environment. This paper is a study of the
communication security aspects of these networks. Resource
limitations and specific architecture of sensor networks call
for customized security mechanisms. Our approach is to
classify the types of data existing in sensor networks, and
identify possible communication security threats according
to that classification. We propose a communication security
scheme where for each type of data we define a corresponding
security mechanism. By employing this multi-tiered security
architecture where each mechanism has different resource
requirements, we allow for efficient resource management,
which is essential for wireless sensor networks.
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...IJCNCJournal
With the growing usage of wireless sensors in a variety of applications including Internet of Things, the security aspects of wireless sensor networks have been on priority for the researchers. Due to the constraints of resources in wireless sensor networks, it has been always a challenge to design efficient security protocols for wireless sensor networks. An novel elliptic curve signcryption based security protocol for wireless sensor networks has been presented in this paper, which provides anonymity, confidentiality, mutual authentication, forward security, secure key establishment, and key privacy at the same time providing resistance from replay attack, impersonation attack, insider attack, offline dictionary attack, and stolen-verifier attack. Results have revealed that the proposed elliptic curve signcryption based protocol consumes the least time in comparison to other protocols while providing the highest level of security.
SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY) IJCSES Journal
Wireless sensor networks (WSNs) have turned to be the backbone of most present-day information technology, which supports the service-oriented architecture in a major activity. Sensor nodes and its restricted and limited resources have been a real challenge because there’s a great engagement with
sensor nodes and Internet Of things (IoT). WSN is considered to be the base stone of IoT which has been widely used recently in too many applications like smart cities, industrial internet, connected cars, connected health care systems, smart grids, smart farming and it's widely used in both military and civilian
applications now, such as monitoring of ambient conditions related to the environment, precious species and critical infrastructures. Secure communication and data transfer among the nodes are strongly needed due to the use of wireless technologies that are easy to eavesdrop, in order to steal its important information. However, is hard to achieve the desired performance of both WSNs and IoT and many critical
issues about sensor networks are still open. The major research areas in WSN is going on hardware, operating system of WSN, localization, synchronization, deployment, architecture, programming models, data aggregation and dissemination, database querying, architecture, middleware, quality of service and security. In This paper we discuss in detail all about Wireless Sensor Networks, its classification, types,
topologies, attack models and the nodes and all related issues and complications. We also preview too many challenges about sensor nodes and the proposed solutions till now and we make a spot ongoing research activities and issues that affect security and performance of Wireless Sensor Network as well.
Then we discuss what’s meant by security objectives, requirements and threat models. Finally, we make a
spot on key management operations, goals, constraints, evaluation metrics, different encryption key types
and dynamic key management schemes.
Wireless Sensor networks are dense networks, which consist of small low cost
sensors having severely constrained computational and energy resources, which operate in
an adhoc environment. Sensor network combines the aspects of distributed sensing,
computing and communication. Despite the numerous applications of sensor networks in
various fields there are various issues which need to be explored and resolved such as
resource constraints, routing, coverage, security, information collection and gathering etc.
In this paper we aim to provide the detailed overview of the wireless sensor technologies and
issues related to them, such as advancement of sensor technology, architecture, applications,
issues and the work done in the field of routing, coverage and security.
Remote temperature and humidity monitoring system using wireless sensor networkseSAT Journals
Abstract Today’s world has become very advanced with smart appliances and devices like laptops, tablets, televisions. smart phones with different features and their usage has been enormously increasing in our day-to-day life. The technology advancement in Digital Electronics and Micro Electro Mechanical Systems. In this scenario the most important role is played by Wireless Sensor Networks and its development and usage in heterogeneous fields and several contexts. the home automation field and process control systems and health control systems widely uses wireless sensor networks. Moreover with WSN we can monitor environments and its conditions also. We are designing a protocol to monitor the environmental temperature and humidity at different conditions. The architecture is simple to construct and ease to implement and also has an advantage of low power consumption. The aim of our paper to describe and show how to create a simple protocol for environment monitoring using a wireless development kit. we are using advanced technology of crossbow motes and NESC Language Programming. Keywords: Motes, WSN, sensor, TinyOS, Nesc.
From Physical to Virtual Wireless Sensor Networks using Cloud Computing IJORCS
In the modern world, billions of physical sensors are used for various dedications: Environment Monitoring, Healthcare, Education, Defense, Manufacturing, Smart Home, Agriculture Precision and others. Nonetheless, they are frequently utilized by their own applications and thereby snubbing the significant possibilities of sharing the resources in order to ensure the availability and performance of physical sensors. This paper assumes that the immense power of the Cloud can only be fully exploited if it is impeccably integrated into our physical lives. The principal merit of this work is a novel architecture where users can share several types of physical sensors easily and consequently many new services can be provided via a virtualized structure that allows allocation of sensor resources to different users and applications under flexible usage scenarios within which users can easily collect, access, process, visualize, archive, share and search large amounts of sensor data from different applications. Moreover, an implementation has been achieved using Arduino-Atmega328 as hardware platform and Eucalyptus/Open Stack with Orchestra-Juju for Private Sensor Cloud. Then this private Cloud has been connected to some famous public clouds such as Amazon EC2, ThingSpeak, SensorCloud and Pachube. The testing was successful at 80%. The recommendation for future work would be to improve the effectiveness of virtual sensors by applying optimization techniques and other methods.
Wireless sensor network plays vital role in today’s life, it is a collection of sensors that are scattered in different directions which are further used to control and measure the physical conditions of environment as well as to organize to the data somewhere at centre location. As in context of greenhouse we can measure various parameters such as temperature, humidity, water level, insect monitoring and light intensity.
Modern Street Lightening System with Intensity Control using GSMpaperpublications3
Abstract: As the LED's lumen efficiency increases rapidly in recent years, many new LED illumination applications are emerging. LEDs have features such as long-life, small and low power consumption. Therefore, they are used in various occasion such as full color large sized LED displays, traffic lights, and etc. In this paper, an energy efficient street lighting system is proposed. The presented system consists of a LED lamp module, which can be controlled from remote location. The proposed remote-control system can optimize intensity and efficiency of street lighting systems. It uses GSM based wireless devices which enable more efficient street lamp-system management, thanks to an advanced interface and control architecture. It uses a sensor combination to control and guarantee the desired system parameters; the information is transferred point by point using GSM Module and is sent to a control terminal used to check the status of the street lamps and to take appropriate measures in case of failure.A developed prototype system will be presented in this paper and experiments will be performed to verify the correctness of the proposed system. According to the experimental results, the lighting efficiency is 85 % and the conversion efficiency is 90 %.
Keywords: WSN (Wireless Sensor Network), GSM (Global System for Mobile Communication), IR (Infrared) CEPT (Conference of European Posts and Telegraphs), IDEN (Integrated Digital Enhanced Network).
Title: Modern Street Lightening System with Intensity Control using GSM
Author: Kapil Aherkar, Pratik Dongrikar, Nikul Dengda, Sukrit Bhattacharya
ISSN 2349-7815
International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE)
Paper Publications
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Wireless Sensor Network (WSN) is a promising field for research. As the use of this field increases, it is
required to give proper security to this field. So to ensure the security of communication of data or messages and to
control the use of data in WSN is of great importance. As sensor networks interact with responsive data and operate
in unfriendly unattended area, from the time of system design these security concerns should be addressed. The paper,
presents a modified Motesec security protocol which is a security mechanism for Wireless sensor network. In this
protocol a hash function based approach is used to detect replay attacks. For data access control key lock matching
method i.e. memory data access control policy is used to prevent unauthorized data access. Encoding and
reconstruction scheme is used to find out attacker. Flooding attack detection by comparing data rate. There is currently
massive research is present in the area of wireless sensor network security..Keywords: GPS,GCM,LBS Android.
Keywords: secure communication architecture, wireless Sensor network security.
With the advancements in wireless technology and digital electronics, some tiny devices have started to be used in numerous areas in daily life. These devices are capable of sensing, computation and communicating. They are generally composed of low power radios, several smart sensors and embedded CPUs (Central Processing Units). These devices are used to form wireless sensor network (WSN) which is necessary to provide sensing services and to monitor environmental conditions. In parallel to WSNs, the idea of internet of things (IoT) is developed where IoT can be defined as an interconnection between identifiable devices within the internet connection in sensing and monitoring processes. This paper presents detailed overview of WSNs. It also assesses the technology and characteristics of WSNs. Moreover, it provides a review of WSN applications and IoT applications.
SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY) IJCSES Journal
Wireless sensor networks (WSNs) have turned to be the backbone of most present-day information technology, which supports the service-oriented architecture in a major activity. Sensor nodes and its restricted and limited resources have been a real challenge because there’s a great engagement with
sensor nodes and Internet Of things (IoT). WSN is considered to be the base stone of IoT which has been widely used recently in too many applications like smart cities, industrial internet, connected cars, connected health care systems, smart grids, smart farming and it's widely used in both military and civilian
applications now, such as monitoring of ambient conditions related to the environment, precious species and critical infrastructures. Secure communication and data transfer among the nodes are strongly needed due to the use of wireless technologies that are easy to eavesdrop, in order to steal its important information. However, is hard to achieve the desired performance of both WSNs and IoT and many critical
issues about sensor networks are still open. The major research areas in WSN is going on hardware, operating system of WSN, localization, synchronization, deployment, architecture, programming models, data aggregation and dissemination, database querying, architecture, middleware, quality of service and security. In This paper we discuss in detail all about Wireless Sensor Networks, its classification, types,
topologies, attack models and the nodes and all related issues and complications. We also preview too many challenges about sensor nodes and the proposed solutions till now and we make a spot ongoing research activities and issues that affect security and performance of Wireless Sensor Network as well.
Then we discuss what’s meant by security objectives, requirements and threat models. Finally, we make a
spot on key management operations, goals, constraints, evaluation metrics, different encryption key types
and dynamic key management schemes.
Wireless Sensor networks are dense networks, which consist of small low cost
sensors having severely constrained computational and energy resources, which operate in
an adhoc environment. Sensor network combines the aspects of distributed sensing,
computing and communication. Despite the numerous applications of sensor networks in
various fields there are various issues which need to be explored and resolved such as
resource constraints, routing, coverage, security, information collection and gathering etc.
In this paper we aim to provide the detailed overview of the wireless sensor technologies and
issues related to them, such as advancement of sensor technology, architecture, applications,
issues and the work done in the field of routing, coverage and security.
Remote temperature and humidity monitoring system using wireless sensor networkseSAT Journals
Abstract Today’s world has become very advanced with smart appliances and devices like laptops, tablets, televisions. smart phones with different features and their usage has been enormously increasing in our day-to-day life. The technology advancement in Digital Electronics and Micro Electro Mechanical Systems. In this scenario the most important role is played by Wireless Sensor Networks and its development and usage in heterogeneous fields and several contexts. the home automation field and process control systems and health control systems widely uses wireless sensor networks. Moreover with WSN we can monitor environments and its conditions also. We are designing a protocol to monitor the environmental temperature and humidity at different conditions. The architecture is simple to construct and ease to implement and also has an advantage of low power consumption. The aim of our paper to describe and show how to create a simple protocol for environment monitoring using a wireless development kit. we are using advanced technology of crossbow motes and NESC Language Programming. Keywords: Motes, WSN, sensor, TinyOS, Nesc.
From Physical to Virtual Wireless Sensor Networks using Cloud Computing IJORCS
In the modern world, billions of physical sensors are used for various dedications: Environment Monitoring, Healthcare, Education, Defense, Manufacturing, Smart Home, Agriculture Precision and others. Nonetheless, they are frequently utilized by their own applications and thereby snubbing the significant possibilities of sharing the resources in order to ensure the availability and performance of physical sensors. This paper assumes that the immense power of the Cloud can only be fully exploited if it is impeccably integrated into our physical lives. The principal merit of this work is a novel architecture where users can share several types of physical sensors easily and consequently many new services can be provided via a virtualized structure that allows allocation of sensor resources to different users and applications under flexible usage scenarios within which users can easily collect, access, process, visualize, archive, share and search large amounts of sensor data from different applications. Moreover, an implementation has been achieved using Arduino-Atmega328 as hardware platform and Eucalyptus/Open Stack with Orchestra-Juju for Private Sensor Cloud. Then this private Cloud has been connected to some famous public clouds such as Amazon EC2, ThingSpeak, SensorCloud and Pachube. The testing was successful at 80%. The recommendation for future work would be to improve the effectiveness of virtual sensors by applying optimization techniques and other methods.
Wireless sensor network plays vital role in today’s life, it is a collection of sensors that are scattered in different directions which are further used to control and measure the physical conditions of environment as well as to organize to the data somewhere at centre location. As in context of greenhouse we can measure various parameters such as temperature, humidity, water level, insect monitoring and light intensity.
Modern Street Lightening System with Intensity Control using GSMpaperpublications3
Abstract: As the LED's lumen efficiency increases rapidly in recent years, many new LED illumination applications are emerging. LEDs have features such as long-life, small and low power consumption. Therefore, they are used in various occasion such as full color large sized LED displays, traffic lights, and etc. In this paper, an energy efficient street lighting system is proposed. The presented system consists of a LED lamp module, which can be controlled from remote location. The proposed remote-control system can optimize intensity and efficiency of street lighting systems. It uses GSM based wireless devices which enable more efficient street lamp-system management, thanks to an advanced interface and control architecture. It uses a sensor combination to control and guarantee the desired system parameters; the information is transferred point by point using GSM Module and is sent to a control terminal used to check the status of the street lamps and to take appropriate measures in case of failure.A developed prototype system will be presented in this paper and experiments will be performed to verify the correctness of the proposed system. According to the experimental results, the lighting efficiency is 85 % and the conversion efficiency is 90 %.
Keywords: WSN (Wireless Sensor Network), GSM (Global System for Mobile Communication), IR (Infrared) CEPT (Conference of European Posts and Telegraphs), IDEN (Integrated Digital Enhanced Network).
Title: Modern Street Lightening System with Intensity Control using GSM
Author: Kapil Aherkar, Pratik Dongrikar, Nikul Dengda, Sukrit Bhattacharya
ISSN 2349-7815
International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE)
Paper Publications
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Wireless Sensor Network (WSN) is a promising field for research. As the use of this field increases, it is
required to give proper security to this field. So to ensure the security of communication of data or messages and to
control the use of data in WSN is of great importance. As sensor networks interact with responsive data and operate
in unfriendly unattended area, from the time of system design these security concerns should be addressed. The paper,
presents a modified Motesec security protocol which is a security mechanism for Wireless sensor network. In this
protocol a hash function based approach is used to detect replay attacks. For data access control key lock matching
method i.e. memory data access control policy is used to prevent unauthorized data access. Encoding and
reconstruction scheme is used to find out attacker. Flooding attack detection by comparing data rate. There is currently
massive research is present in the area of wireless sensor network security..Keywords: GPS,GCM,LBS Android.
Keywords: secure communication architecture, wireless Sensor network security.
With the advancements in wireless technology and digital electronics, some tiny devices have started to be used in numerous areas in daily life. These devices are capable of sensing, computation and communicating. They are generally composed of low power radios, several smart sensors and embedded CPUs (Central Processing Units). These devices are used to form wireless sensor network (WSN) which is necessary to provide sensing services and to monitor environmental conditions. In parallel to WSNs, the idea of internet of things (IoT) is developed where IoT can be defined as an interconnection between identifiable devices within the internet connection in sensing and monitoring processes. This paper presents detailed overview of WSNs. It also assesses the technology and characteristics of WSNs. Moreover, it provides a review of WSN applications and IoT applications.
Each technological age has been marked by a shift in how the industrial platform enables companies to rethink their business processes and create wealth. In the talk I argue that we are limiting our view of what this next industrial/digital age can offer because of how we read, measure and through that perceive the world (how we cherry pick data). Companies are locked in metrics and quantitative measures, data that can fit into a spreadsheet. And by that they see the digital transformation merely as an efficiency tool to the fossil fuel age. But we need to stretch further…
A wireless sensor network has important applications such as remote environmental monitoring and target tracking, particularly in recent years with the help of sensors that are smaller, cheaper, and intelligent. Sensors are equipped with wireless interfaces with which they can communicate with one another to form a network. A WSN consists of a number of sensor nodes (few tens to thousands) working together to monitor a region to obtain data about the environment. The design of a WSN depends significantly on the application, and it must consider factors such as the environment, the applications design objectives, cost, hardware, and system constraints.
Current Activities in WSN: Developing test bed for target tracking Using Passive Infrared and Ultrasonic Sensors Improving the delivery rate in low power wireless networks .Guided Navigation of Friendly Vehicle towards tracked Object. Design and development of smart mines and explosive ordinance for intelligent activation and deactivation and safe recovery based on secure WSN. Design of a data mule for data collection from remotely placed sensor nodes
The course gives the thorough concepts of the wireless sensor networks, applications examples. It also gives detailed study of sensor node architecture and various protocols used in wireless sensor networks. It also covers issues related to topology, clustering ,synchronization and operating execution environment used for wireless sensor networks.
Cyber-Defensive Architecture for Networked Industrial Control SystemsIJEACS
This paper deals with the inevitable consequence of the convenience and efficiency we benefit from the open, networked control system operation of safety-critical applications: vulnerability to such system from cyber-attacks. Even with numerous metrics and methods for intrusion detection and mitigation strategy, a complete detection and deterrence of internal code flaws and outside cyber-attacks has not been found and would not be found anytime soon. Considering the ever incompleteness of detection and prevention and the impact and consequence of mal-functions of the safety-critical operations caused by cyber incidents, this paper proposes a new computer control system architecture which assures resiliency even under compromised situations. The proposed architecture is centered on diversification of hardware systems and unidirectional communication from the proposed system in alerting suspicious activities to upper layers. This paper details the architectural structure of the proposed cyber defensive computer control system architecture for power substation applications and its validation in lab experimentation and on a cybersecurity testbed.
This Presentation is all about the Sensor Network that is how the Sensor via Wireless Network work, in the scenario where wired connection is not possible.
Design Issues and Challenges in Wireless Sensor NetworksKhushbooGupta145
Wireless Sensor Networks (WSNs) are composed self-organized wireless ad hoc networks which comprise of a large number of resource constrained sensor nodes. The major areas of research in WSN is going on hardware, and operating system of WSN, deployment, architecture, localization, synchronization, programming models, data aggregation and dissemination, database querying, architecture, middleware, quality of service and security. This paper study highlights ongoing research activities and issues that affect the design and performance of Wireless Sensor Network.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
1. Autonomic Computing in Wireless Sensor Networks
1
Jaffer Basha J#, 2Elanthendral.M #
1
Jafferbasha2001@gmail.com, 2thendral5320@gmail.com
UG STUDENTS
#
Department of Computer Science and Engineering
SREE Sowdambika College of engineering, Arruppukottai
Abstract— Wireless ad hoc networks of sensor nodes are The paper introduces Autonomic computing and wireless
envisioned to be deployed in the physical environment to sensor network concepts. Discusses how the fundamental
monitor a wide variety of real-world phenomena. Wireless properties of Autonomic computing comply with the basic
sensor networks (WSN’s) are becoming popular in military design requirements for wireless sensor networks. Proposed
and civilian applications such as surveillance, monitoring, protocols for Wireless Sensor Network and their applicability
disaster recovery, home automation and many others. Almost and suitability to Autonomic Wireless Sensor Networks and
any sensor network application requires some form of self- required improvements. The paper gives brief overview of
configuration and autonomic functionality. Following IBM’s research projects and architectures for autonomic
initiatives towards Autonomic computing many architectures communication and networking which can be applied to
and protocols for network self-organization and management WSNs. The last section focuses on the current and possible
have been proposed and being implemented. future applications of Autonomic Wireless Sensor Networks.
The paper presents concept of Autonomic Computing with
respect to Wireless Sensor Network. The paper introduces
Wireless sensor network basics, design goals and challenges II. AUTONOMIC COMPUTING
along with current and future applications. It articulates A. Background
basic needs of incorporating autonomic computing principles
into the design of Wireless Sensor Networks. The paper also The dramatic increase in computing devices increased
outlines recent contributions to Autonomic network computing capacity and complexity combined with popularity
architectures, research projects, proposed architectures and of internet resulted in phenomenal growth in heterogeneous
routing protocols for Autonomic Wireless Sensor Networks. networks and network applications. With this increasing
system complexity, network management issues and
communication protocols are reaching a level beyond human
ability to manage and secure so the stability of current
Keywords— Wireless sensor networks, Autonomic Computing,
infrastructure, systems, and data is at an increasingly greater
Autonomic Wireless sensor networks, Service oriented architecture
risk to suffer outages and general disrepair. Future network
algorithms need to be adaptive, robust, and scalable with fully
distributed and self-organizing architectures. Automation,
I. INTRODUCTION self-protection and self management of wide spread networks
Wireless sensor networks have critical applications in the may solve the problem till some extent.
scientific, medical, commercial, and military domains. As the concept of self management rooted up, the most
Examples of these applications include environmental direct inspiration one can think of was the autonomic function
monitoring, smart homes and offices, surveillance, and of the human central nervous system, where autonomic
intelligent transportation systems. It also has significant controls use motor neurons to send indirect messages to
usages in biomedical field. As social reliance on wireless organs at a sub-conscious level. These messages regulate
sensor network technology increases, we can expect the size temperature, breathing, and heart rate without conscious
and complexity of individual networks as well as the number thought. Observation and analysis of these complex adaptive
of networks to increase dramatically. systems found in nature became a major source of inspiration
Wireless sensor networks are typically used in highly to design algorithms for self-managed, self-organized, self-
dynamic, and hostile environments with no human existence configuring and self-protecting systems.
(unlike conventional data networks), and therefore, they must Taking inspiration from autonomic nervous system of the
be tolerant to the failure and loss of connectivity of individual human body IBM created a foundation for autonomic systems
nodes. The sensor nodes should be intelligent to recover from by taking initiatives towards Autonomic Computing for
failures with minimum human involvement. Networks should relieving humans from the burden of managing computer
support process of autonomous formation of connectivity, systems which is growing enormously till the extent of
addressing, and routing structures. Recent researches on unmanageability [1].
Autonomic Networking can serve as basis for design of
Autonomic Wireless Sensor Networks. B. Autonomic System
2. Autonomic System is a system which works independently allocation techniques, security and management schemes need
on predefined policies and rules without any human to be developed for autonomic elements, and a scalable
interaction and manage and configure itself on its own based management platform is required to coordinate the autonomic
on predefined rules and gained knowledge over the time. IBM elements into a self-managing system.
has defined the following four functional areas for self
management of Autonomic System: [3]
• Self-Configuration: Automatic configuration of
components.
• Self-Healing: Automatic discovery, and correction of
faults.
• Self-Optimization: Automatic monitoring and control of
resources to ensure the optimal functioning with respect
to the defined requirements.
• Self-Protection: Proactive identification and protection
from arbitrary attacks
C. IBM Autonomic Computing Architecture Figure 2. Basic Architecture of Wireless Sensor Network
IBM Autonomic Computing Architecture [2] defines an
abstract information framework for self-managing IT systems.
In the information framework, an autonomic system is a
III. WIRELESS SENSOR NETWORK
collection of autonomic elements. Each autonomic element
consists of an autonomic manager (AM) and the managed A wireless sensor network (WSN) is a network that is made
resource (MR). The communication between the AM and the of hundreds or thousands of sensor nodes which are densely
MR is done through the MR’s management interfaces, which deployed in an unattended environment with the capabilities
exposes two types of hooks, sensors and effectors. The of sensing, wireless communications and computations (i.e.
sensors are used by the AM to obtain the internal state of the collecting and disseminating environmental data). These
MR, and the effectors are used by the AM to change the spatially distributed autonomous devices cooperatively
behaviour of the MR. The AM enables self-management of monitor physical and environmental conditions, such as
the resource using a ‘‘monitoring, analysis, planning, and temperature, sound, vibration, pressure, motion or pollutants,
execution’’ control loop, with supporting knowledge of the at different locations. The basic architecture of Wireless
computing environment, management policies, and some sensor Network is shown in Figure2.
other related considerations.
Figure 3. Components of a Sensor Node (Ref [04])
Each autonomic node in a sensor network is typically
Figure 1. Basic Autonomic Computing Reference Architecture
equipped with a radio transceiver or other wireless
communications device, a processing unit which can be a
The autonomic computing information model only provides
small micro-controller, sensing unit, and an energy source,
the conceptual guidance on designing self-managed systems;
usually an alkaline battery. Sometimes, a mobilizer is needed
in practice, the information model needs to be mapped to an
to move sensor node from current position and carry out the
implementable management and control architecture for
assigned tasks. Since the sensor may be mobile, the base
Autonomic Networks. Specifically, measurement techniques,
station may require accurate location of the node which is
rule engines, planning methodologies, dynamic resource
3. done by location finding system. The size of a single sensor some applications may require a faster communication
node can vary from shoebox-sized nodes down to devices the and instant response. Routing algorithms should be
size of grain of dust. [4] intelligent to choose minimum hop and minimum
distance paths for data transfer. [7]
• Management challenge – Managing the communication
A. Requirements and Design factors in WSN over heterogeneous networks is basic challenge in self-
Following are some of the basic requirements and design managed system because policies and communication
factors of wireless sensor network which serve as guidelines protocols plan an important role in network
for development of protocols and algorithms for WSN communication. Also, it is necessary to balance the level
communication architecture. of detail the network is providing to the client against the
• Fault Tolerance, Adaptability and Reliability: Sensor rate at which energy is being consumed while gathering
networks are required to operate through adapting to the the data. Clearly, it is preferable to have the network
environmental changes that sensors monitor. The automatically do this tuning, rather than requiring manual
networks should be self-learning. Reliability is the ability intervention.
to maintain the sensor network functionalities without any
interruption due to sensor node failure. Sensor node may These basic requirements and design goals serve as
fail due to lack of energy, physical damage, challenge for current technology. Though current IP routing
communications problem, inactivity, or environmental protocol exist and have significant applications in current
interference. The network should be able to detect failure networks and Internet, they do not satisfy complete design
of a node and organize itself, reconfigure and recover requirements in Wireless sensor networks because WSN
from node failures without loosing any information. [5] nodes typically has limited computing capacities and less
• Power Consumption and Power management: One of the power. So WSN’s require a different infrastructure and
components of sensor nodes is the power source which protocol stack which can be implemented using autonomic
can be a battery. The wireless sensor node being a computing concept as we will discuss in next section.
microelectronic device, can only be equipped with a
limited power source [4]. Over the remote inaccessible
place with less human control and existence, power IV. WSN AND AUTONOMIC COMPUTING
sources play critical role in survival of sensor nodes. To clarify the contribution that autonomic computing can
Power source should be intelligently divided over bring to Wireless Sensor Networks (WSN), let’s examine how
sensing, computation, and communications phases as per WSN design requirements and operations can be tackled using
requirement. Sensors can be hibernated when inactive. autonomic principles.
Lots of current researches are focusing on designing As discussed above, there can be sensor nodes which are
power-aware protocols and algorithms for wireless sensor moving and can change their position dynamically or even
networks. Recently, solar energy is also considered as an leave the network coverage area. Therefore, a pre-
option for empowering remote sensor nodes which are programmed configuration for the network will not work.
exposed environment. Self-configuring nodes can set up network connections,
• Network Efficiency and Data Aggregation: Flooding raw evaluate if there are any gaps in the WSN and replace a
sensed data over the network can easily congest the moved or dead node in the network. Since sensors can be
network. Some critical applications like intruder deployed in an unattended area (e.g., forest and ocean) or
detectors require urgent transmission and faster physically unreachable area (e.g., inside a building wall), they
processing of data which may degrade performance and are required to operate with the minimum aid from base
loose reliability due to congestion or latency in the stations or human administrators. Although majority of
network. Intelligent aggregation of sensed data and current sensor application have already considered this in their
elimination of unwanted and redundant information and network design, there is still a need for WSN to have the
data compression can be a solution for efficient resource ability to reconfigure and recover itself without too much
and energy utilization and congestion avoidance. Many human intervene, especially in inaccessible environment. [4,5]
algorithms like directed diffusion [6] are proposed to Sensor reading usually contains some noises; it may be a
facilitate data aggregation and dissemination within the false positive due to malfunction of sensors. Sensors are
context of WSNs. required to collectively self-heal (i.e., detect and eliminate)
• Intelligent Routing: In many applications, sensor nodes false positives in their sensor readings instead of transmitting
are moving nodes and can change place dynamically. them to base stations. This can also reduce power
Routing protocols must be adaptive to these changes and consumption of sensors because data processing within the
should be self-healing and self-configuring. The sensor incurs much less power consumption than data
information should be persistent in spite of changes in transmission does [7].
network nodes. Low processing capacity of a node creates Sensor nodes are generally exposed to much harsher
many challenges for routing packets throughout the conditions than standard computing equipment, and are thus
neighbouring nodes intelligently. As discussed above, subject to energy depletion and incidental damage. Battery
4. failure can result in lost sensor node. This leads to a gradual Service-oriented architecture [14] is an approach to build
degradation of the network as individual nodes are lost. distributed systems that deliver application functionality as
Network paths break and gaps appear in the coverage area. A services to end-user applications or to build other services. It
WSN needs to adapt to the changes, recover from losses and decomposes the design of large complex application, and
be self-protected. This can be achieved by renegotiating middleware architecture into various reusable services or
network routes, monitoring voltage levels within sensor node, function units. In SOA the service requester has no knowledge
controlling each node by an agent or base station and upon of the technical details of the provider’s implementation, such
failure activating redundant nodes to replace damaged ones, or as the programming language, deployment platform, and so
by informing some higher-level entity which can provide forth. The service requester typically invokes operations by
assistance. way of messages -- a request message and the response --
As discussed in requirements, maximum efficiency needs rather than through the use of APIs or file formats. Thus, the
to be gained from the available energy as the available energy application developers only need to concern the operational
at each sensor node is limited. Sensing, Processing and data description of the service which allows software on each side
transfer phases require lot of energy so each node should be of the conversation to change without impacting the other.
able to sense process and transfer data intelligently hence self-
optimization is an important trait for WSN protocols. Energy
savings can be achieved by putting the nodes into a low power
sleep mode, ready to be reactivated when the need arises. For
example, sensors may decrease their duty cycles when there is
no significant change in their sensor readings. This results in
less power consumption in the sensors. Also, when
neighboring sensors report environmental changes, a sensor
may draw inference from the reports and increase its duty
cycle to be more watchful for a potential local environmental
change in the future. However, there exists a trade-off in that
the computational cost of a globally-optimal solution such as
this is often computationally intractable, whether by 8-bit
nodes or 64-bit base-stations.
All basic WSN self-management principles comply with
the concept of autonomic computing. So IBM autonomic
computing principles can be applied to wireless sensor
networks to get the desired functionality in vastly growing Figure 4. Basic Model of MANNA Architecture (Ref [19])
sensor network applications.
So far, the implementation and design of SOA is mostly
dependent on Web Services with standardized web
V. AUTONOMIC WSN MANAGEMENT ARCHITECTURE technologies such as WSDL, OGSA. As a result, it is not
As discussed in section 2.3, the basic Autonomic directly applicable to all of those complex technologies on
Computing model only provides the conceptual guidance on those resource-constrained sensor nodes. MANNA [12] has
designing self-managed systems and needs to be mapped to an presented some initial ideas of using the concept of service
implementable management and control architecture for semantics from SOA.
Autonomic Networks. An architecture for Autonomic In MANNA, all the management function units sit at the
communication and networking is an area of research lately lowest level of management architecture. They are designed
and many architectures are proposed and being developed. All with specific implementation for individual objectives in
these architectures aim to produce an architectural design that consideration of unique features of WSN. A service, at the top
enables flexible, dynamic and fully autonomic formation of layer, can use one or more of those management functions.
large-scale networks in which the functionalities of each Different services can share the same functions, but still
constituent network node are also composed in an autonomic concern each individual given aspect based on the polices and
fashion. Moreover, these architectures also support mobile network state obtained from WSN models. The basic model of
nodes and multiple administrative domains so these can be MANNA architecture is as shown in figure 4 [12].
applied to wireless sensor networks for achieving desired Furthermore, SOA can specially deal with WSN unique
goals and meet above mention challenges.Following is the aspects such heterogeneity, mobility and adaptation, and
brief discussion of some visions for the design of an efficient offers seamless management integration in the wireless
management architecture for WSNs based on top of the basic environments. Although the special features of SOA are
autonomic computing architecture. marvellous, there is still a large amount of research challenge
needed to address before the concepts of SOA can be
A. Service-Oriented Architecture appropriately applied into WSNs.
5. B. Policy Based Architecture Here is a brief overview of the current research projects
Policy-based management has presented its robust ability to based on Architecture for Autonomic Network
support designing of self-adaptive decentralized management communication and Self-Management which will serve as
service in WSNs. Davy S. et al. [13] proposed an autonomic guidelines for Autonomic WSN’s and will bring revolution to
communications architecture that manages complexity WSN’s and its applications.
through policy-based management by incorporating a shared A. Bison
information model integrated with knowledge-based
reasoning mechanisms to provide self-governing behaviour. BISON was a three-year project funded by the European
The architecture is organized using four distinct Commission. BISON aimed confronting the complexity
architectural constructs i.e. Shared Information, Virtual explosion problem by building robust Network Information
Software, Infrastructure and Policy as shown in figure 5.The Systems that are self-organizing and self-repairing.
shared information over the network is managed through a
virtual software which support autonomic functionality for BISON developed techniques and tools for building robust,
different heterogeneous networks and components combined self-organizing and adaptive Network Information System as
with network infrastructure which include network elements ensembles of autonomous agents by drawing inspiration from
and other computing devices. All these three modules are biological processes and mechanisms like ant colonies for
governed by policy module. [13] routing in overlay networks using swarm intelligence,
lifecycle of Dictyostelium for load balancing, epidemics for
aggregation and immune system for search.
BISON explored the use of ideas derived from complex
adaptive systems (CAS) to enable the construction of robust
and self-organizing information systems for deployment in
highly dynamic network environments. The project proposed
solutions to important problems arising in overlay networks
and mobile ad-hoc networks by developing algorithms for
routing in mobile ad-hoc networks, topology control in sensor
networks along with data aggregation and content search
algorithms for peer to peer networks. [15]
B. ANA (Autonomic Network Architecture)
ANA framework is built on the objective to provide an
architectural framework that allows the accommodation of
and communication between various networks, ranging from
small scale Personal Area Networks, through (Mobile) Ad hoc
Networks and special purpose networks such as Sensor
Networks, to global scale networks, in particular the Internet.
Figure 5. Proposed Policy Based Autonomic Architecture
ANA framework specifies how networks interact.
This model is based on three important concepts of
autonomic computing: (1) the sharing and reusing of common
information and knowledge, (2) the application of machine
learning and knowledge-based reasoning to guide the changes
in behaviour of the system, and (3) an extensible and flexible
governance model that forms a closed control loop that learns
from its decisions.
Similarly, in MANNA [12], policies describe a set of
desired behaviours of management components (e.g. manager
and agent) for indicating the real-time operations. Based on
polices, managers and agents can interact with each other in a
cooperative fashion to achieve a desired overall management
goal such as form groups of nodes, control network density,
and keep the coverage of the WSN area.
Figure 6. ANA Framework and Network compartments
VI. BRIEF OVERVIEW OF RESEARCH PROJECTS ON AUTONOMIC
NETWORKS ANA introduces the core concept of "network
compartments." The compartment abstraction allows
6. atomization or decomposition of communication systems and VII.APPLICATIONS AND FUTURE WORK
networks into smaller and more easily manageable units. For The applications for WSNs are many and varied. They are
example, compartments will allow decomposition of today’s used in commercial and industrial applications to monitor data
global IP network into appropriate sub-networks, which can that would be difficult or expensive to monitor using wired
be managed more autonomously from the overall network sensors. Typical applications of WSNs include monitoring,
(e.g., a different addressing or routing scheme can be applied tracking, and controlling. Some of the specific applications are
inside each compartment). [8] habitat monitoring, object tracking, nuclear reactor
A (network) compartment implements the operational controlling, fire detection, traffic monitoring and so on.
rules and administrative policies for a given communication
context. Compartments typically perform functions like 1) Wireless sensor networks are currently being used for
registration and degradation, policy enforcement, identifier intrusion detection by forming a perimeter around a secure
management and resolution and Routing. area and monitoring the progression of intruders (passing
Addressing and naming are left to compartments. The information from one node to the next). WSN’s could be
main advantages of this approach are:No need to impose a further deployed in Military applications such as hostile
unique way to resolve names and manage a unique global tracking and surveillance, spy monitoring.
addressing scheme. It is open to future addressing and naming
2) Other major current application of WSN include
schemes.
environment monitoring and applications such as animal
tracking, flood detection and weather prediction and
C. Haggle forecasting and commercial applications like seismic
activities monitoring and prediction. Many weather
Haggle is a new autonomic networking architecture
forecasting websites use WSN technology for retrieving
designed to enable communication in the presence of
weather details in remote inhibited areas. [16]
intermittent network connectivity, which exploits autonomic
opportunistic communications (i.e., in the absence of end-to- 3) WSN’s are used widely in automation and control and
end communication infrastructures). Haggle node architecture Artificial intelligence applications like Robotics.
takes inspiration from human communication model. [9]
4) Sensor networks are increasingly being used in Health
The main components of Haggle are: applications for monitoring changes in patient’s health,
• A revolutionary paradigm for autonomic behaviour and heart rate.
communication, based on advanced local forwarding and 5) Resent research project at Wayne State University and the
sensitive to realistic human mobility Kresge Eye Institute developed artificial retina using
• A simple and powerful architecture oriented to Wireless Biomedical sensors. The project aimed to build a
opportunistic message relaying, and based on privacy, chronically implanted artificial retina with sufficient visual
authentication, trust and advanced data handling functionality to allow persons without vision or with
• An open environment for the easy proliferation of limited vision to “see” at an acceptable level. [11]
applications and services.
6) Moreover, this Wireless biomedical sensor technology can
be effectively used to treat diabetes, by providing a more
D. CASCADAS consistent, accurate, and less invasive method for
CASCADAS (Component-ware for Autonomic Situation- monitoring glucose levels. Currently, to monitor blood
aware Communications, and Dynamically Adaptable glucose levels, a lancet is used to prick a finger; a drop of
Services) is an ongoing project like ANA and Haggle. blood is placed on a test strip, which is analyzed either
The overall goal of CASCADAS is identifying, manually or electronically. This constant pricking several
developing, and evaluating architectures and solutions based times a day over a period of years can damage the tissue
on a general-purpose component model for autonomic and blood vessels in that area. As proposed by Schwiebert
communication services; specifically in such context et al. [11], Wireless biomedical sensors could be implanted
autonomic service components autonomously achieve self- in the patient once. The sensor would monitor the glucose
organization and self-adaptation towards the provision of levels and transmit the results to a wristwatch display.
adaptive and situated communication-intensive services. 7) Wireless biomedical sensors may play a key role in early
detection of Cancer. As discussed in [11], cancer cells
CASACDAS approach is based on four key scientific exude nitric oxide, which affects the blood flow in the area
principles i.e. situation awareness, semantic self organization, surrounding a tumor. A sensor with the ability to detect
self similarity and Autonomic component awareness around these changes in the blood flow can be placed in suspect
which the future communication services infrastructures locations. It is likely that any abnormalities could be
should be designed and built. [10] detected much sooner with the sensors than without.
7. 8) RFID, video and various kinds of embedded sensors can Available from WWW:
http://citeseer.ist.psu.edu/intanagonwiwat00directed.html
be used to track and monitor the patient in their everyday [7] O'Hare G.M.P., O'Grady M.J., D. Marsh, Ruzzelli A. G. and Tynan R.
activities. This information can be processed and relayed “Autonomic Wireless Sensor Networks: Intelligent. Ubiquitous
to medical personnel. Patient's routine can be assembled Sensing” Available from WWW: www.cs.ucd.ie/csprism/publications/
over the period of time and deviations from this may be pub2006/ANIPLA06.pdf
[8] ANA: Autonomic Network Architecture Project. http://www.ana-
recognized and analyzed. project.org/
[9] Haggle Project. http://www.haggleproject.org
[10] CASCADAS project. http://www.cascadas-project.org
VIII.CONCLUSIONS [11] Schwiebert L., Gupta S., Weinmann J., “Research Challenges in
Wireless Networks of Biomedical Sensors” in proceedings of the 7th
annual international conference on Mobile computing and networking.
Wireless Sensor Network technology offers significant Available from WWW: http://portal.acm.org/citation.cfm?id=381692
potential in numerous application domains. Given the diverse [12] Linnyer Beatrys Ruiz, J.M.S.N., Antonio A.F. Loureiro, “MANNA: A
Management Architecture for Wireless Sensor Networks.” IEEE
nature of these domains, it is essential that WSNs perform in a Communications Magazine, 2003. 41(2): p. 116-125. Available from
reliable and robust fashion. I believe, wireless sensor network WWW: http://www.lisha.ufsc.br/~lucas/docs/Ruiz-2003.pdf
has proved its usage in the future distributed computing [13] Davy S. et al. “Policy-Based Architecture to Enable Autonomic
environment. However, there are significant amount of Communications”. Available from WWW:
http://techpubs.motorola.com/download/IPCOM000141400D/IPCOM0
technical challenges and design issues those needs to be 00141400D.pdf
addressed. One of the biggest challenges is the designing of [14] Colan, M. Service-Oriented Architecture expands the vision of Web
efficient network management architecture to continuously services, Part 1. June, 2004 Available from WWW:
support WSNs for providing services for various sensor http://www-128.ibm.com/developerworks/library/ws-soaintro.html
[15] Gianni A., Di Caro, Frederick Ducatelle, Luca M. Gambardella,
applications. The unique features of WSNs make the design “BISON: Biology-Inspired techniques for Self-Organization in
and implementation of such management architecture dynamic Networks” Available from WWW:
different enough from the traditional networks which can be http://www.idsia.ch/~frederick/bison.pdf
[16] Wireless Sensor Networks Wiki.
satisfied by concept of Autonomic Computing. There is still
http://en.wikipedia.org/wiki/Wireless_sensor_network
no particular generic network management architecture so
taking inspiration from IBMs Autonomic Computing concept
and Biological neural network system many different research
projects are currently being executed.
In this paper, we discussed concepts of Autonomic
computing, Wireless Sensor Networks (WSN’s). Design
criteria for WSN and how it matches basic Autonomic
principles. Then we overviewed few architectures and routing
protocols suitable for WSN and ongoing research work of
Autonomic communication and network management
architectures which can be applied to WSNs. Finally, we
summarized some of the WSN applications along with future
usages.
REFERENCES
[1] P. Horn, “Autonomic Computing: IBMs Perspective on the State of
Information Technology”, Oct. 2001. Available from the World Wide
Web (WWW): http://www.research.ibm.com/autonomic/
[2] IBM and autonomic computing, “An architectural blueprint for
autonomic computing,” April 2003. Available from the WWW: http://
www-03.ibm.com/autonomic/pdfs/ACwpFinal.pdf
[3] Kephart J, and Chess D, “The Vision of Autonomic Computing”
Computer Magazine, IEEE, 2003. Available from WWW:
http://www.research.ibm.com/autonomic/research/papers/AC_Vision_
Computer_Jan_2003.pdf
[4] I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, ”A survey
on Sensor Networks,” IEEE Communications Magazine, vol. 40, Issue:
8, pp. 102-114, August 2002. Available from WWW:
http://citeseer.ist.psu.edu/akyildiz02survey.html
[5] Yu Mengjie, Mokhtar H., Merabti M., “A Survey of Network
Management Architecture in Wireless Sensor Network” Available from
WWW: www.cms.livjm.ac.uk/senman/Papers/2006-093.pdf
[6] C. Intanagonwiwat, R. Govindan, D. Estrin, J. Heidemann, and F.
Silva, ”Directed Diffusion for Wireless Sensor Networking,”
IEEE/ACM Transactions on Networking, vol. 11, pp. 2-16, Feb. 2003.