2,755 research outputs found

    Optimization of WSN using Biological Inspired Self-Organized Secure Autonomous Routing Protocol

    Get PDF
    Since last three decade, Wireless Sensor Network is one of the biggest innovative technologies; it provides facility of heavy data traffic and management telecommunication by sensing, computation and communication into a small device. Main threat for this type of data transfer is data security in terms of maintains data integrity, high consumption of energy, end-to-end delay and high cost of nodes i.e. sensor. Handling all h issue at same time is the difficult task. SRTLD and BIOSARP are two routing protocol which helps in improving performance of the WSN. This paper is a detail description of secure architecture which is based on SRTLD and BIOSARP protocol. The main objective of this architecture is to provide high security by taking into account low energy consumption, low end-to-end delay and low node level cost. This mechanism uses concept of ACO (Ant Colony Optimization) which helps in achieving objective of the architectur

    Bio-inspired network security for 5G-enabled IoT applications

    Get PDF
    Every IPv6-enabled device connected and communicating over the Internet forms the Internet of things (IoT) that is prevalent in society and is used in daily life. This IoT platform will quickly grow to be populated with billions or more objects by making every electrical appliance, car, and even items of furniture smart and connected. The 5th generation (5G) and beyond networks will further boost these IoT systems. The massive utilization of these systems over gigabits per second generates numerous issues. Owing to the huge complexity in large-scale deployment of IoT, data privacy and security are the most prominent challenges, especially for critical applications such as Industry 4.0, e-healthcare, and military. Threat agents persistently strive to find new vulnerabilities and exploit them. Therefore, including promising security measures to support the running systems, not to harm or collapse them, is essential. Nature-inspired algorithms have the capability to provide autonomous and sustainable defense and healing mechanisms. This paper first surveys the 5G network layer security for IoT applications and lists the network layer security vulnerabilities and requirements in wireless sensor networks, IoT, and 5G-enabled IoT. Second, a detailed literature review is conducted with the current network layer security methods and the bio-inspired techniques for IoT applications exchanging data packets over 5G. Finally, the bio-inspired algorithms are analyzed in the context of providing a secure network layer for IoT applications connected over 5G and beyond networks

    Self-Synchronization in Duty-cycled Internet of Things (IoT) Applications

    Full text link
    In recent years, the networks of low-power devices have gained popularity. Typically these devices are wireless and interact to form large networks such as the Machine to Machine (M2M) networks, Internet of Things (IoT), Wearable Computing, and Wireless Sensor Networks. The collaboration among these devices is a key to achieving the full potential of these networks. A major problem in this field is to guarantee robust communication between elements while keeping the whole network energy efficient. In this paper, we introduce an extended and improved emergent broadcast slot (EBS) scheme, which facilitates collaboration for robust communication and is energy efficient. In the EBS, nodes communication unit remains in sleeping mode and are awake just to communicate. The EBS scheme is fully decentralized, that is, nodes coordinate their wake-up window in partially overlapped manner within each duty-cycle to avoid message collisions. We show the theoretical convergence behavior of the scheme, which is confirmed through real test-bed experimentation.Comment: 12 Pages, 11 Figures, Journa

    The Vital Network: An Algorithmic Milieu of Communication and Control

    Get PDF
    The biological turn in computing has influenced the development of algorithmic control and what I call the vital network: a dynamic, relational, and generative assemblage that is self-organizing in response to the heterogeneity of contemporary network processes, connections, and communication. I discuss this biological turn in computation and control for communication alongside historically significant developments in cybernetics that set out the foundation for the development of self-regulating computer systems. Control is shifting away from models that historically relied on the human-animal model of cognition to govern communication and control, as in early cybernetics and computer science, to a decentred, nonhuman model of control by algorithm for communication and networks. To illustrate the rise of contemporary algorithmic control, I outline a particular example, that of the biologically-inspired routing algorithm known as a ‘quorum sensing’ algorithm. The increasing expansion of algorithms as a sense-making apparatus is important in the context of social media, but also in the subsystems that coordinate networked flows of information. In that domain, algorithms are not inferring categories of identity, sociality, and practice associated with Internet consumers, rather, these algorithms are designed to act on information flows as they are transmitted along the network. The development of autonomous control realized through the power of the algorithm to monitor, sort, organize, determine, and transmit communication is the form of control emerging as a postscript to Gilles Deleuze’s ‘postscript on societies of control.

    Bioinspired Principles for Large-Scale Networked Sensor Systems: An Overview

    Get PDF
    Biology has often been used as a source of inspiration in computer science and engineering. Bioinspired principles have found their way into network node design and research due to the appealing analogies between biological systems and large networks of small sensors. This paper provides an overview of bioinspired principles and methods such as swarm intelligence, natural time synchronization, artificial immune system and intercellular information exchange applicable for sensor network design. Bioinspired principles and methods are discussed in the context of routing, clustering, time synchronization, optimal node deployment, localization and security and privacy

    Biologically inspired, self organizing communication networks.

    Get PDF
    PhDThe problem of energy-efficient, reliable, accurate and self-organized target tracking in Wireless Sensor Networks (WSNs) is considered for sensor nodes with limited physical resources and abrupt manoeuvring mobile targets. A biologically inspired, adaptive multi-sensor scheme is proposed for collaborative Single Target Tracking (STT) and Multi-Target Tracking (MTT). Behavioural data obtained while tracking the targets including the targets’ previous locations is recorded as metadata to compute the target sampling interval, target importance and local monitoring interval so that tracking continuity and energy-efficiency are improved. The subsequent sensor groups that track the targets are selected proactively according to the information associated with the predicted target location probability such that the overall tracking performance is optimized or nearly-optimized. One sensor node from each of the selected groups is elected as a main node for management operations so that energy efficiency and load balancing are improved. A decision algorithm is proposed to allow the “conflict” nodes that are located in the sensing areas of more than one target at the same time to decide their preferred target according to the target importance and the distance to the target. A tracking recovery mechanism is developed to provide the tracking reliability in the event of target loss. The problem of task mapping and scheduling in WSNs is also considered. A Biological Independent Task Allocation (BITA) algorithm and a Biological Task Mapping and Scheduling (BTMS) algorithm are developed to execute an application using a group of sensor nodes. BITA, BTMS and the functional specialization of the sensor groups in target tracking are all inspired from biological behaviours of differentiation in zygote formation. Simulation results show that compared with other well-known schemes, the proposed tracking, task mapping and scheduling schemes can provide a significant improvement in energy-efficiency and computational time, whilst maintaining acceptable accuracy and seamless tracking, even with abrupt manoeuvring targets.Queen Mary university of London full Scholarshi

    06031 Abstracts Collection -- Organic Computing -- Controlled Emergence

    Get PDF
    Organic Computing has emerged recently as a challenging vision for future information processing systems, based on the insight that we will soon be surrounded by large collections of autonomous systems equipped with sensors and actuators to be aware of their environment, to communicate freely, and to organize themselves in order to perform the actions and services required. Organic Computing Systems will adapt dynamically to the current conditions of its environment, they will be self-organizing, self-configuring, self-healing, self-protecting, self-explaining, and context-aware. From 15.01.06 to 20.01.06, the Dagstuhl Seminar 06031 ``Organic Computing -- Controlled Emergence\u27\u27 was held in the International Conference and Research Center (IBFI), Schloss Dagstuhl. The seminar was characterized by the very constructive search for common ground between engineering and natural sciences, between informatics on the one hand and biology, neuroscience, and chemistry on the other. The common denominator was the objective to build practically usable self-organizing and emergent systems or their components. An indicator for the practical orientation of the seminar was the large number of OC application systems, envisioned or already under implementation, such as the Internet, robotics, wireless sensor networks, traffic control, computer vision, organic systems on chip, an adaptive and self-organizing room with intelligent sensors or reconfigurable guiding systems for smart office buildings. The application orientation was also apparent by the large number of methods and tools presented during the seminar, which might be used as building blocks for OC systems, such as an evolutionary design methodology, OC architectures, especially several implementations of observer/controller structures, measures and measurement tools for emergence and complexity, assertion-based methods to control self-organization, wrappings, a software methodology to build reflective systems, and components for OC middleware. Organic Computing is clearly oriented towards applications but is augmented at the same time by more theoretical bio-inspired and nature-inspired work, such as chemical computing, theory of complex systems and non-linear dynamics, control mechanisms in insect swarms, homeostatic mechanisms in the brain, a quantitative approach to robustness, abstraction and instantiation as a central metaphor for understanding complex systems. Compared to its beginnings, Organic Computing is coming of age. The OC vision is increasingly padded with meaningful applications and usable tools, but the path towards full OC systems is still complex. There is progress in a more scientific understanding of emergent processes. In the future, we must understand more clearly how to open the configuration space of technical systems for on-line modification. Finally, we must make sure that the human user remains in full control while allowing the systems to optimize
    corecore