{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T04:05:15Z","timestamp":1746245115849,"version":"3.40.4"},"publisher-location":"London","reference-count":129,"publisher":"Springer London","isbn-type":[{"type":"print","value":"9781447163732"},{"type":"electronic","value":"9781447163749"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-1-4471-6374-9_10","type":"book-chapter","created":{"date-parts":[[2014,4,16]],"date-time":"2014-04-16T13:47:56Z","timestamp":1397656076000},"page":"405-462","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Autonomic Sensing"],"prefix":"10.1007","author":[{"given":"Benny","family":"Lo","sequence":"first","affiliation":[]},{"given":"Athanasia","family":"Panousopoulou","sequence":"additional","affiliation":[]},{"given":"Surapa","family":"Thiemjarus","sequence":"additional","affiliation":[]},{"given":"Guang-Zhong","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,3,12]]},"reference":[{"key":"10_CR1","unstructured":"H. Ellis, Clinical anatomy: a revision and applied anatomy for clinical students, 10th ed., 2002."},{"key":"10_CR2","unstructured":"D. Male, J. Brostoff, D. B. Roth, and I. M. Roitt, Immunology, 8 ed.: Elsevier Ltd, 2012."},{"key":"10_CR3","unstructured":"D. Male, Immunology \u2013 an illustrated outline, 4 ed.: Mosby, Elsevier Science Limited, 2004."},{"key":"10_CR4","doi-asserted-by":"publisher","first-page":"S3","DOI":"10.1016\/j.jaci.2009.12.980","volume":"125","author":"DD Chaplin","year":"2010","unstructured":"D. D. Chaplin, \u201cOverview of the immune response,\u201d Journal of Allergy and Clinical Immunology, vol. 125, pp. S3\u2013S23, 2010.","journal-title":"Journal of Allergy and Clinical Immunology"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"J. O. Kephart and D. M. Chess. (January 2003) The vision of autonomic computing. IEEE Computer Magazine. 41\u201350.","DOI":"10.1109\/MC.2003.1160055"},{"key":"10_CR6","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MC.2003.1160055","volume":"36","author":"JO Kephart","year":"2003","unstructured":"J. O. Kephart and D. M. Chess, \u201cThe vision of autonomic computing,\u201d Computer, vol. 36, pp. 41\u201350, 2003.","journal-title":"Computer"},{"key":"10_CR7","unstructured":"R. Murch, Autonomic Computing, 1 ed.: IBM Press, 2004."},{"key":"10_CR8","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1016\/S0098-1354(02)00160-6","volume":"27","author":"V Venkatasubramanian","year":"2003","unstructured":"V. Venkatasubramanian, R. Rengaswamy, K. Yin, and S. N. Kavuri, \u201cA review of process fault detection and diagnosis. Part I: Quantitative model-based methods,\u201d Computers and Chemical Engineering, vol. 27, pp. 293\u2013311, 2003.","journal-title":"Computers and Chemical Engineering"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"A. A. Lazar, W. Wang, and R. H. Deng, \u201cModels and algorithms for network fault detection and identification: a review,\u201d in Singapore International Conference on Communications\/International Symposium on Information Theory and Its Applications, ed, 1992, pp. 9999\u20131003.","DOI":"10.1109\/ICCS.1992.255112"},{"key":"10_CR10","unstructured":"L. Kant, A. S. Sethi, and M. Steinder, \u201cFault localization and self-healing mechanisms for FCS networks,\u201d in the Twenty-Third Army Science Conference, Orlando, Florida, 2002."},{"key":"10_CR11","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1109\/18.910572","volume":"47","author":"FR Kschischang","year":"2001","unstructured":"F. R. Kschischang, B. J. Frey, and H.-A. Loeliger, \u201cFactor graphs and the sum-product algorithm,\u201d IEEE Transactions on Information Theory, Special Issue on Codes on Graphs and Iterative Algorithms, vol. 47, pp. 498\u2013519, 2001.","journal-title":"IEEE Transactions on Information Theory, Special Issue on Codes on Graphs and Iterative Algorithms"},{"key":"10_CR12","unstructured":"B. J. Frey, \u201cExtending factor graphs so as to unify directed and undirected graphical models,\u201d in the Nineteenth Conference on Uncertainty in Artificial Intelligence, Acapulco, Mexico, 2003."},{"key":"10_CR13","unstructured":"J. H. Kim and J. Pearl, \u201cA computational model for causal and diagnostic reasoning in inference engines,\u201d in the Eighth International Joint Conference on Artificial Intelligence, Karlsruhe, West Germany, 1983, pp. 190\u2013193."},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"J. Pearl, \u201cA constraint-propagation approach to probabilistic reasoning,\u201d in the First Annual Conference on Uncertainty in Artificial Intelligence, Rome, New York, USA, 1985, pp. 357\u2013370.","DOI":"10.1016\/B978-0-444-70058-2.50031-0"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"J. Pearl, Probabilistic reasoning in intelligent systems: networks of plausible inference: Morgan Kaufmann, 1988.","DOI":"10.1016\/B978-0-08-051489-5.50008-4"},{"key":"10_CR16","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/0004-3702(90)90060-D","volume":"42","author":"GF Cooper","year":"1990","unstructured":"G. F. Cooper, \u201cThe computational complexity of probabilistic inferences,\u201d Artificial Intelligence, vol. 42, pp. 393\u2013405, 1990.","journal-title":"Artificial Intelligence"},{"key":"10_CR17","volume-title":"Probabilistic reasoning in intelligent systems: networks of plausible inference","author":"J Pearl","year":"1988","unstructured":"J. Pearl, Probabilistic reasoning in intelligent systems: networks of plausible inference. San Mateo, CA: Morgan Kaufmann, 1988."},{"key":"10_CR18","unstructured":"K. Murphy. (1998). A brief introduction to graphical models and Bayesian networks. Available: http:\/\/www.cs.ubc.ca\/~murphyk\/Bayes\/bayes_tutorial.pdf"},{"key":"10_CR19","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1109\/TIT.1968.1054142","volume":"IT-14","author":"CK Chow","year":"1968","unstructured":"C. K. Chow and C. N. Liu, \u201cApproximating discrete probability distribution with dependence trees,\u201d IEEE Transactions on Information Theory, vol. IT-14, pp. 462\u2013267, 1968.","journal-title":"IEEE Transactions on Information Theory"},{"key":"10_CR20","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1109\/MEX.1986.4306979","volume":"1","author":"PP Shenoy","year":"1986","unstructured":"P. P. Shenoy and G. Shafer, \u201cPropagating belief functions using local computations,\u201d IEEE Expert, vol. 1, pp. 43\u201352, 1986.","journal-title":"IEEE Expert"},{"key":"10_CR21","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/BF01531015","volume":"2","author":"G Shafer","year":"1990","unstructured":"G. Shafer and P. P. Shenoy, \u201cProbability propagation,\u201d Annals of Mathematics and Artificial Intelligence, vol. 2, pp. 327\u2013352, 1990.","journal-title":"Annals of Mathematics and Artificial Intelligence"},{"key":"10_CR22","volume-title":"Axioms for probability and belief-function propagation","author":"PP Shenoy","year":"1990","unstructured":"P. P. Shenoy and G. Shafer, Axioms for probability and belief-function propagation. San Francisco, CA: Morgan Kaufmann, 1990."},{"key":"10_CR23","unstructured":"F. V. Jensen, S. L. Lauritzen, and K. G. Olesen, \u201cBayesian updating in causal probabilistic networks by local computation,\u201d Computational Statistics Quarterly, vol. 4, 1990."},{"key":"10_CR24","doi-asserted-by":"crossref","unstructured":"S. Lauritzen and D. Spiegelhalter, \u201cLocal computations with probabilities on graphical structures and their application to expert systems,\u201d Journal of the Royal Statistical Society B, 1988.","DOI":"10.1111\/j.2517-6161.1988.tb01721.x"},{"key":"10_CR25","unstructured":"R. Dechter, \u201cBucket elimination: a unifying framework for several probabilistic inference algorithms,\u201d in the Twelfth Conference on Uncertainty in Artificial Intelligence, Portland, Oregon, USA, 1996."},{"key":"10_CR26","doi-asserted-by":"crossref","unstructured":"F. Cozman, \u201cGeneralizing variable elimination in Bayesian networks,\u201d in Workshop on Probabilistic Reasoning in Artificial Intelligence, ed. Atibaia, Brazil, 2000.","DOI":"10.1016\/S0004-3702(00)00029-1"},{"key":"10_CR27","doi-asserted-by":"crossref","unstructured":"R. Shachter, \u201cIntelligent probabilistic inference,\u201d in the First Annual Conference on Uncertainty in Artificial Intelligence, ed. UCLA, Los Angeles, CA, 1985.","DOI":"10.1016\/B978-0-444-70058-2.50032-2"},{"key":"10_CR28","doi-asserted-by":"crossref","unstructured":"R. Shachter, \u201cEvidence absorption and propagation through evidence reversals,\u201d in the Fifth Conference on Uncertainty in Artificial Intelligence, ed. University of Windsor, Ontario, 1989.","DOI":"10.1016\/B978-0-444-88738-2.50021-X"},{"key":"10_CR29","doi-asserted-by":"crossref","unstructured":"Z. Li and B. D\u2019Ambrosio, \u201cEfficient inference in Bayes network as a combinatorial optimization problem,\u201d International Journal of Approximate Reasoning, vol. 11, 1994.","DOI":"10.1016\/0888-613X(94)90019-1"},{"key":"10_CR30","unstructured":"A. Darwiche, \u201cA differential approach to inference in Bayesian networks,\u201d in the Sixteenth Conference on Uncertainty in Artificial Intelligence, ed. Stanford, Palo Alto, CA, 2000."},{"key":"10_CR31","doi-asserted-by":"crossref","unstructured":"R. D. Shachter and M. A. Peot, \u201cSimulation approaches to general probabilistic inference on belief networks,\u201d in the Fifth Conference on Uncertainty in Artificial Intelligence, University of Windsor, Ontario, 1989.","DOI":"10.1016\/B978-0-444-88738-2.50024-5"},{"key":"10_CR32","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1109\/TPAMI.1984.4767596","volume":"6","author":"S Geman","year":"1984","unstructured":"S. Geman and D. Geman, \u201cStochastic relaxation, Gibbs distribution and the Bayesian restoration of images,\u201d IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 6, pp. 721\u2013741, 1984.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"10_CR33","doi-asserted-by":"crossref","unstructured":"D. MacKay, \u201cIntroduction to Monte Carlo methods,\u201d in Learning in Graphical Models, M. I. Jordan, Ed., ed: MIT Press, 1998.","DOI":"10.1007\/978-94-011-5014-9_7"},{"key":"10_CR34","unstructured":"H. J. S. H. Horvitz, and G. F. Cooper, \u201cBounded conditioning: flexible inference for decisions under scarce resources,\u201d in the Fifth Conference on Uncertainty in Artificial Intelligence, ed. Windsor, Ontario, 1989."},{"key":"10_CR35","unstructured":"R. Dechter, \u201cMini-buckets: a general scheme for generating approximations in automated reasoning in probabilistic inference,\u201d in the Fifteenth International Joint Conference on Artificial Intelligence, Nagoya, Japan, 1997."},{"key":"10_CR36","unstructured":"K. Murphy, Y. Weiss, and M. I. Jordan, \u201cLoopy belief propagation for approximate inference: an empirical study,\u201d in the Fifteenth Conference on Uncertainty in Artificial Intelligence, ed, 1999, pp. 467\u2013475."},{"key":"10_CR37","doi-asserted-by":"crossref","unstructured":"Y. Weiss, \u201cCorrectness of belief propagation in Gaussian graphical models of arbitrary topology,\u201d Neural Computation, vol. 13, 2001.","DOI":"10.1162\/089976601750541769"},{"key":"10_CR38","unstructured":"M. J. Wainwrght and M. I. Jordan, \u201cGraphical models, exponential families and variational inference,\u201d University of California, Berkeley, Technical Report 649, 2003."},{"key":"10_CR39","unstructured":"H. Guo and W. Hsu, \u201cA survey of algorithms for real-time Bayesian network inference,\u201d in Joint Workshop on Real-Time Decision Support and Diagnosis Systems, ed. Edmonton, Canada, 2002."},{"key":"10_CR40","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/S0954-1810(96)00035-0","volume":"12","author":"C-K Kwoh","year":"1998","unstructured":"C.-K. Kwoh and D. F. Gillies, \u201cProbabilistic reasoning and multiple-expert methodology for correlated objective data,\u201d Artificial Intelligence in Engineering, vol. 12, pp. 21\u201333, 1998.","journal-title":"Artificial Intelligence in Engineering"},{"key":"10_CR41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/0004-3702(95)00119-0","volume":"88","author":"C-K Kwoh","year":"1996","unstructured":"C.-K. Kwoh and D. F. Gillies, \u201cUsing hidden nodes in Bayesian network,\u201d Artificial Intelligence, vol. 88, pp. 1\u201338, 1996.","journal-title":"Artificial Intelligence"},{"key":"10_CR42","unstructured":"M. Chu, S. K. Mitter, and F. Zhao, \u201cAn information architecture for distributed inference on ad hoc sensor networks,\u201d in the Forty-First Annual Allerton Conference on Communication, Control, and Computing, ed. Monticello, IL, USA, 2003."},{"key":"10_CR43","doi-asserted-by":"crossref","unstructured":"M. Alanyali, S. Venkatesh, O. Savas, and S. Aeron, \u201cDistributed Bayesian hypothesis testing in sensor networks,\u201d in the 2004 American Control Conference, 2004, pp. 5369\u20135374.","DOI":"10.23919\/ACC.2004.1384706"},{"key":"10_CR44","doi-asserted-by":"crossref","unstructured":"A. T. Ihler, J. W. Fisher, R. L. Moses, and A. S. Willsky, \u201cNonparametric belief propagation for sensor network self-calibration,\u201d IEEE Journal on Selected Areas in Communications, 2005.","DOI":"10.1145\/984622.984656"},{"key":"10_CR45","unstructured":"C. Crick and A. Pfeffer, \u201cLoopy belief propagation as a basis for communication in sensor networks,\u201d in the Nineteenth Conference on Uncertainty in Artificial Intelligence, Acapulco, Mexico, 2003."},{"key":"10_CR46","unstructured":"M. A. Paskin, C. E. Guestrin, and J. McFadden, \u201cA robust architecture for distributed inference in sensor networks,\u201d in the Fourth International Symposium on Information Processing in Sensor Networks, 2005."},{"key":"10_CR47","unstructured":"M. A. Paskin and C. E. Guestrin, \u201cRobust probabilistic inference in distributed systems,\u201d in the Twentieth ACM International Conference on Uncertainty in Artificial Intelligence, ed. Banff, Canada, 2004, pp. 436\u2013445."},{"key":"10_CR48","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1002\/wcm.893","volume":"12","author":"L Atallah","year":"2012","unstructured":"L. Atallah, D. McIlwraith, S. Thiemjarus, B. Lo, and G. Z. Yang, \u201cDistributed inferencing with ambient and wearable sensors,\u201d Wireless Communications and Mobile Computing, vol. 12, pp. 117\u2013131, 2012.","journal-title":"Wireless Communications and Mobile Computing"},{"key":"10_CR49","doi-asserted-by":"crossref","unstructured":"P. S. Hall and Y. Hao, Antennas and Propagation for Body-Centric Wireless Communications: Artech House Inc, 2006.","DOI":"10.1049\/ic:20070537"},{"key":"10_CR50","unstructured":"S. Thiemjarus, B. P. L. Lo, and G. Z. Yang, \u201cA distributed Bayesian framework for body sensor networks,\u201d in the Second International Workshop on Body Sensor Networks, Imperial College, London, 2005."},{"key":"10_CR51","unstructured":"S. Thiemjarus, B. P. L. Lo, and G. Z. Yang, \u201cA noise resilient distributed inference framework for body sensor networks,\u201d in the Third International Conference on Pervasive Computing, ed. Munich, Germany, 2005, pp. 13\u201318."},{"key":"10_CR52","doi-asserted-by":"publisher","first-page":"933","DOI":"10.1109\/TITB.2009.2033054","volume":"13","author":"E Reusens","year":"2009","unstructured":"E. Reusens, W. Joseph, B. Latr\u00e9, B. Braem, G. Vermeeren, E. Tanghe, L. Martens, I. Moerman, and C. Blondia, \u201cCharacterization of on-body communication channel and energy efficient topology design for wireless body area networks,\u201d Information Technology in Biomedicine, IEEE Transactions on, vol. 13, pp. 933\u2013945, 2009.","journal-title":"Information Technology in Biomedicine, IEEE Transactions on"},{"key":"10_CR53","doi-asserted-by":"crossref","unstructured":"A. Natarajan, M. Motani, B. de Silva, K.-K. Yap, and K. C. Chua, \u201cInvestigating network architectures for body sensor networks,\u201d in Proceedings of the 1st ACM SIGMOBILE international workshop on Systems and networking support for healthcare and assisted living environments, 2007, pp. 19\u201324.","DOI":"10.1145\/1248054.1248061"},{"key":"10_CR54","doi-asserted-by":"crossref","unstructured":"A. Natarajan, B. de Silva, K.-K. Yap, and M. Motani, \u201cLink layer behavior of body area networks at 2.4 ghz,\u201d in Proceedings of the 15th annual international conference on Mobile computing and networking, 2009, pp. 241\u2013252.","DOI":"10.1145\/1614320.1614347"},{"key":"10_CR55","doi-asserted-by":"crossref","unstructured":"A. Natarajan, B. De Silva, K.-K. Yap, and M. Motani, \u201cTo hop or not to hop: Network architecture for body sensor networks,\u201d in Sensor, Mesh and Ad Hoc Communications and Networks, 2009. SECON\u201909. 6th Annual IEEE Communications Society Conference on, 2009, pp. 1\u20139.","DOI":"10.1109\/SAHCN.2009.5168978"},{"key":"10_CR56","doi-asserted-by":"publisher","first-page":"1065","DOI":"10.1007\/s10916-010-9571-3","volume":"36","author":"S Ullah","year":"2012","unstructured":"S. Ullah, H. Higgins, B. Braem, B. Latre, C. Blondia, I. Moerman, S. Saleem, Z. Rahman, and K. S. Kwak, \u201cA comprehensive survey of wireless body area networks,\u201d Journal of Medical Systems, vol. 36, pp. 1065\u20131094, 2012.","journal-title":"Journal of Medical Systems"},{"key":"10_CR57","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11276-010-0252-4","volume":"17","author":"B Latr\u00e9","year":"2011","unstructured":"B. Latr\u00e9, B. Braem, I. Moerman, C. Blondia, and P. Demeester, \u201cA survey on wireless body area networks,\u201d Wireless Networks, vol. 17, pp. 1\u201318, 2011.","journal-title":"Wireless Networks"},{"key":"10_CR58","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/BF02459572","volume":"52","author":"AM Turing","year":"1990","unstructured":"A. M. Turing, \u201cThe chemical basis of morphogenesis,\u201d Bulletin of mathematical biology, vol. 52, pp. 153\u2013197, 1990.","journal-title":"Bulletin of mathematical biology"},{"key":"10_CR59","doi-asserted-by":"crossref","unstructured":"M. Durvy and P. Thiran, \u201cReaction-diffusion based transmission patterns for ad hoc networks,\u201d in INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE, 2005, pp. 2195\u20132205.","DOI":"10.1109\/INFCOM.2005.1498494"},{"key":"10_CR60","doi-asserted-by":"crossref","unstructured":"A. Tyrrell, G. Auer, and C. Bettstetter, \u201cBiologically inspired synchronization for wireless networks,\u201d in Advances in Biologically Inspired Information Systems, ed: Springer, 2007, pp. 47\u201362.","DOI":"10.1007\/978-3-540-72693-7_3"},{"key":"10_CR61","doi-asserted-by":"crossref","unstructured":"J. Degesys, I. Rose, A. Patel, and R. Nagpal, \u201cDESYNC: self-organizing desynchronization and TDMA on wireless sensor networks,\u201d in Proceedings of the 6th international conference on Information processing in sensor networks, 2007, pp. 11\u201320.","DOI":"10.1109\/IPSN.2007.4379660"},{"key":"10_CR62","doi-asserted-by":"crossref","unstructured":"J. Degesys and R. Nagpal, \u201cTowards desynchronization of multi-hop topologies,\u201d in Self-Adaptive and Self-Organizing Systems, 2008. SASO\u201908. Second IEEE International Conference on, 2008, pp. 129\u2013138.","DOI":"10.1109\/SASO.2008.70"},{"key":"10_CR63","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/s11721-012-0067-2","volume":"6","author":"H Hern\u00e1ndez","year":"2012","unstructured":"H. Hern\u00e1ndez and C. Blum, \u201cDistributed graph coloring: an approach based on the calling behavior of Japanese tree frogs,\u201d Swarm Intelligence, vol. 6, pp. 117\u2013150, 2012.","journal-title":"Swarm Intelligence"},{"key":"10_CR64","doi-asserted-by":"publisher","first-page":"1645","DOI":"10.1137\/0150098","volume":"50","author":"RE Mirollo","year":"1990","unstructured":"R. E. Mirollo and S. H. Strogatz, \u201cSynchronization of pulse-coupled biological oscillators,\u201d SIAM Journal on Applied Mathematics, vol. 50, pp. 1645\u20131662, 1990.","journal-title":"SIAM Journal on Applied Mathematics"},{"key":"10_CR65","doi-asserted-by":"publisher","first-page":"564","DOI":"10.1109\/JSAC.2010.100506","volume":"28","author":"R Pagliari","year":"2010","unstructured":"R. Pagliari, Y.-W. Hong, and A. Scaglione, \u201cBio-inspired algorithms for decentralized round-robin and proportional fair scheduling,\u201d Selected Areas in Communications, IEEE Journal on, vol. 28, pp. 564\u2013575, 2010.","journal-title":"Selected Areas in Communications, IEEE Journal on"},{"key":"10_CR66","doi-asserted-by":"crossref","unstructured":"R. Pagliari, A. Scaglione, and R. A. Tannious, \u201cDesign of a distributed protocol for proportional fairness in wireless body area networks,\u201d in Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE, 2010, pp. 1\u20136.","DOI":"10.1109\/GLOCOM.2010.5683810"},{"key":"10_CR67","doi-asserted-by":"crossref","unstructured":"R. A. Tannious and A. Scaglione, \u201cPhysical layer design of distributed proportional fair scheduling in wireless body area networks,\u201d in Personal, Indoor and Mobile Radio Communications Workshops (PIMRC Workshops), 2010 I.E. 21st International Symposium on, 2010, pp. 78\u201383.","DOI":"10.1109\/PIMRCW.2010.5670516"},{"key":"10_CR68","doi-asserted-by":"crossref","unstructured":"W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, \u201cEnergy-efficient communication protocol for wireless microsensor networks,\u201d in System Sciences, 2000. Proceedings of the 33rd Annual Hawaii International Conference on, 2000, p. 10 pp. vol. 2.","DOI":"10.1109\/HICSS.2000.926982"},{"key":"10_CR69","doi-asserted-by":"crossref","unstructured":"S. Lindsey and C. S. Raghavendra, \u201cPEGASIS: Power-efficient gathering in sensor information systems,\u201d in Aerospace conference proceedings, 2002. IEEE, 2002, pp. 3-1125\u20133-1130 vol. 3.","DOI":"10.1109\/AERO.2002.1035242"},{"key":"10_CR70","unstructured":"R. C. Shah and J. M. Rabaey, \u201cEnergy aware routing for low energy ad hoc sensor networks,\u201d in Wireless Communications and Networking Conference, 2002. WCNC2002. 2002 IEEE, 2002, pp. 350\u2013355."},{"key":"10_CR71","unstructured":"A. Manjeshwar and D. P. Agrawal, \u201cTEEN: A Routing Protocol for Enhanced Efficiency in Wireless Sensor Networks,\u201d in IPDPS, 2001, p. 189."},{"key":"10_CR72","doi-asserted-by":"crossref","unstructured":"A. Manjeshwar and D. P. Agrawal, \u201cAPTEEN: A Hybrid Protocol for Efficient Routing and Comprehensive Information Retrieval in Wireless Sensor Networks,\u201d in ipdps, 2002, p. 48.","DOI":"10.1109\/IPDPS.2002.1016600"},{"key":"10_CR73","doi-asserted-by":"crossref","unstructured":"B. Braem, B. Latre, I. Moerman, C. Blondia, and P. Demeester, \u201cThe wireless autonomous spanning tree protocol for multihop wireless body area networks,\u201d in Mobile and Ubiquitous Systems: Networking & Services, 2006 Third Annual International Conference on, 2006, pp. 1\u20138.","DOI":"10.1109\/MOBIQ.2006.340421"},{"key":"10_CR74","doi-asserted-by":"crossref","unstructured":"T. Watteyne, I. Aug\u00e9-Blum, M. Dohler, and D. Barthel, \u201cAnybody: a self-organization protocol for body area networks,\u201d in Proceedings of the ICST 2nd international conference on Body area networks, 2007, p. 6.","DOI":"10.4108\/bodynets.2007.186"},{"key":"10_CR75","unstructured":"X. Ji and H. Zha, \u201cSensor positioning in wireless ad hoc sensor networks using multidimensional scaling,\u201d in the IEEE INFOCOM, 2004."},{"key":"10_CR76","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1109\/T-C.1969.222678","volume":"C-18","author":"JW Sammon","year":"1969","unstructured":"J. W. Sammon, \u201cA nonlinear mapping for data structure analysis,\u201d IEEE Transactions on Computers, vol. C-18, pp. 401\u2013409, 1969.","journal-title":"IEEE Transactions on Computers"},{"key":"10_CR77","unstructured":"R. Yan, D. Ball, A. Deshmukh, and R. X. Gao, \u201cA Bayesian network approach to energy-aware distributed sensing,\u201d in Sensors, 2004. Proceedings of IEEE, 2004, pp. 44\u201347."},{"key":"10_CR78","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1111\/j.1467-8640.1993.tb00306.x","volume":"9","author":"Y Xiang","year":"1993","unstructured":"Y. Xiang, D. Poole, and M. P. Beddoes, \u201cMultiply sectioned Bayesian networks and junction forests for large knowledge based systems,\u201d Computational Intelligence, vol. 9, pp. 171\u2013220, 1993.","journal-title":"Computational Intelligence"},{"key":"10_CR79","doi-asserted-by":"crossref","unstructured":"Y. Xiang and V. Lesser, \u201cJustifying multiply sectioned Bayesian networks,\u201d in the Fourth International Conference on Multi-Agent, Boston, 2000, pp. 349\u2013356.","DOI":"10.1109\/ICMAS.2000.858473"},{"key":"10_CR80","unstructured":"R. Yan, D. Ball, A. Deshmukh, and R. X. Gao, \u201cA Bayesian network approach to energy-aware distributed sensing,\u201d in IEEE Sensors Conference, Vienna, Austria, 2004, pp. 44\u201347."},{"key":"10_CR81","doi-asserted-by":"crossref","unstructured":"F. Dressler, \u201cSelf-organized event detection in sensor networks using bio-inspired promoters and inhibitors,\u201d in Proceedings of the 3rd International Conference on Bio-Inspired Models of Network, Information and Computing Systems, 2008, p. 10.","DOI":"10.4108\/ICST.BIONETICS2008.4697"},{"key":"10_CR82","doi-asserted-by":"crossref","unstructured":"K. Lorincz, B.-r. Chen, G. W. Challen, A. R. Chowdhury, S. Patel, P. Bonato, and M. Welsh, \u201cMercury: a wearable sensor network platform for high-fidelity motion analysis,\u201d in SenSys, 2009, pp. 183\u2013196.","DOI":"10.1145\/1644038.1644057"},{"key":"10_CR83","unstructured":"The BSN node. Available: http:\/\/ubimon.doc.ic.ac.uk\/bsn\/index.php?article=167"},{"key":"10_CR84","unstructured":"L. N. De Castro and J. Timmis, Artificial immune systems: a new computational intelligence approach: Springer Verlag, 2002."},{"key":"10_CR85","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1016\/j.adhoc.2003.09.010","volume":"3","author":"K Akkaya","year":"2005","unstructured":"K. Akkaya and M. Younis, \u201cA survey on routing protocols for wireless sensor networks,\u201d Ad hoc networks, vol. 3, pp. 325\u2013349, 2005.","journal-title":"Ad hoc networks"},{"key":"10_CR86","doi-asserted-by":"publisher","DOI":"10.1002\/0470095121","volume-title":"Protocols and architectures for wireless sensor networks","author":"H Karl","year":"2005","unstructured":"H. Karl and A. Willig, Protocols and architectures for wireless sensor networks. Chichester, West Sussex: John Wiley and Sons, 2005."},{"key":"10_CR87","doi-asserted-by":"crossref","unstructured":"A. Wood and J. Stankovic, \u201cA taxonomy for denial-of-service attacks in wireless sensor networks,\u201d in Handbook of Sensor Networks, M. Ilyas and I. Mahgoub, Eds., ed Boca Raton, Florida: CRC Press, 2005, pp. 32.1-32.20.","DOI":"10.1201\/9780203489635.ch32"},{"key":"10_CR88","doi-asserted-by":"crossref","unstructured":"C. Karlof and D. Wagner, \u201cSecure routing in wireless sensor networks: attacks an countermeasures,\u201d in the First IEEE International Workshop on Sensor Network Protocols Applications, 2003.","DOI":"10.1016\/S1570-8705(03)00008-8"},{"key":"10_CR89","doi-asserted-by":"crossref","unstructured":"J. R. Douceur, \u201cThe Sybil attack,\u201d in the First International Workshop on Peer-to-Peer Systems, 2002.","DOI":"10.1007\/3-540-45748-8_24"},{"key":"10_CR90","unstructured":"Y. C. Hu, A. Perrig, and D. B. Johnson, \u201cWormhole detection in wireless ad hoc networks,\u201d Department of Computer Science, Rice University, Technical Report TR01-384, 2002."},{"key":"10_CR91","doi-asserted-by":"crossref","unstructured":"A. D. Wood and J. A. Stankovic, \u201cA taxonomy for denial-of-service attacks in wireless sensor networks,\u201d Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, pp. 739\u2013763, 2004.","DOI":"10.1201\/9780203489635.ch32"},{"key":"10_CR92","doi-asserted-by":"crossref","unstructured":"U. Cetintemel, A. Flinders, and Y. Sun, \u201cPower-efficient data dissemination in wireless sensor networks,\u201d in the Third International ACM Workshop on Data Engineering for Wireless and Mobile Access, San Diego, California, 2003.","DOI":"10.1145\/940923.940925"},{"key":"10_CR93","doi-asserted-by":"crossref","unstructured":"J. W. Hui and D. Culler, \u201cThe dynamic behavior of a data dissemination protocol for network programming at scale,\u201d in the Second ACM Conference on Embedded Networked Sensor Systems, ed. Baltimore, Maryland, USA, 2004.","DOI":"10.1145\/1031495.1031506"},{"key":"10_CR94","doi-asserted-by":"crossref","unstructured":"A. Perrig, R. Szewczyk, V. Wen, S. Culler, and J. D. Tygar, \u201cSPINS: security protocols for sensor networks,\u201d in the Seventh Annual International Conference on Mobile Computing and Networking, Rome, Italy, 2001.","DOI":"10.1145\/381677.381696"},{"key":"10_CR95","doi-asserted-by":"crossref","unstructured":"R. L. Rivest, \u201cThe RC5 encryption algorithm,\u201d in the Second Workshop on Fast Software Encryption, ed, 1995, pp. 86\u201396.","DOI":"10.1007\/3-540-60590-8_7"},{"key":"10_CR96","unstructured":"A. Perrig, R. Canetti, J. D. Tygar, and D. Song, \u201cEfficient authentication and signing of multicast streams over lossy channels,\u201d in Security and Privacy, 2000. S&P 2000. Proceedings. 2000 I.E. Symposium on, 2000, pp. 56\u201373."},{"key":"10_CR97","unstructured":"D. Liu and P. Ning, \u201cEfficient distribution of key chain commitments for broadcast authentication in distributed sensor networks,\u201d in the Tenth Symposium of Network Distributed System, Security, Internet Society, ed. Reston, VA, 2003."},{"key":"10_CR98","unstructured":"W. Du, J. Deng, Y. Han, S. Chen, and P. Varshney, \u201cA key management scheme for wireless sensor networks using deployment knowledge,\u201d in IEEE INFOCOM, ed. Hong Kong, 2004."},{"key":"10_CR99","doi-asserted-by":"crossref","unstructured":"D. Liu and P. Ning, \u201cEstablishing pairwise keys in distributed sensor networks,\u201d in The Tenth ACM Conference on Computer and Communications Security, Washington D.C., 2003.","DOI":"10.1145\/948109.948119"},{"key":"10_CR100","doi-asserted-by":"crossref","unstructured":"D. Liu and P. Ning, \u201cLocation-based pairwise key establishments for relatively static sensor networks,\u201d in the 2003 ACM Workshop on Security of Ad Hoc and Sensor networks, ed. George W. Johnson Center at George Mason University, Fairfax., V.A., USA, 2003.","DOI":"10.1145\/986858.986869"},{"key":"10_CR101","doi-asserted-by":"crossref","unstructured":"G. Eschenauer and D. Gligor, \u201cA key management scheme for distributed sensor networks,\u201d in the Ninth ACM Conference on Computer Communication Security, ed. New York, USA, 2002.","DOI":"10.1145\/586110.586117"},{"key":"10_CR102","unstructured":"H. Chan, A. Perrig, and D. Song, \u201cRandom key predistribution schemes for sensor networks,\u201d in IEEE Symposium of Security and Privacy, Los Alamitos, CA, 2003."},{"key":"10_CR103","doi-asserted-by":"crossref","unstructured":"S. Slijepcevic, J. Wong, and M. Potkonjak, \u201cSecurity and privacy protection in wireless sensor networks,\u201d in Handbook of Sensor Networks: Compact Wireless and Wired Sensing System, M. Ilyas and I. Mahgoub, Eds., ed Florida, USA: CRC Press, 2004.","DOI":"10.1201\/9780203489635.sec8"},{"key":"10_CR104","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1109\/MC.2005.388","volume":"3","author":"B Arazi","year":"2005","unstructured":"B. Arazi, I. Elhanany, O. Arazi, and H. Qi, \u201cRevising public-key cryptography for wireless sensor networks,\u201d IEEE Computer, vol. 3, pp. 103\u2013105, 2005.","journal-title":"IEEE Computer"},{"key":"10_CR105","doi-asserted-by":"crossref","unstructured":"D. Malan, M. Welsh, and M. D. Smith, \u201cA public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography,\u201d in the First Annual IEEE Communication Society Conference on Sensor and Ad Hoc Communications and Networks, 2004, pp. 71\u201380.","DOI":"10.1109\/SAHCN.2004.1381904"},{"key":"10_CR106","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1002\/wcm.884","volume":"11","author":"CS Jang","year":"2011","unstructured":"C. S. Jang, D. G. Lee, J.-w. Han, and J. H. Park, \u201cHybrid security protocol for wireless body area networks,\u201d Wireless Communications and Mobile Computing, vol. 11, pp. 277\u2013288, 2011.","journal-title":"Wireless Communications and Mobile Computing"},{"key":"10_CR107","unstructured":"R. Yasmin, E. Ritter, and G. Wang, \u201cA pairing-free ID-based one-pass authenticated key establishment protocol for wireless sensor networks,\u201d in SENSORCOMM 2011, The Fifth International Conference on Sensor Technologies and Applications, 2011, pp. 340\u2013347."},{"key":"10_CR108","doi-asserted-by":"publisher","first-page":"948","DOI":"10.1109\/JPROC.2004.827372","volume":"92","author":"U Uludag","year":"2004","unstructured":"U. Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain, \u201cBiometric cryptosystems: issues and challenges,\u201d Proceedings of the IEEE, vol. 92, pp. 948\u2013960, 2004.","journal-title":"Proceedings of the IEEE"},{"key":"10_CR109","unstructured":"S. Cherukuri, K. K. Venkatasubramanian, and S. K. Gupta, \u201cBioSec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body,\u201d in Parallel Processing Workshops, 2003. Proceedings. 2003 International Conference on, 2003, pp. 432\u2013439."},{"key":"10_CR110","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/S0167-4048(04)00064-1","volume":"23","author":"J Szczepanski","year":"2004","unstructured":"J. Szczepanski, E. Wajnryb, J. M. Amig\u00f3, M. V. Sanchez-Vives, and M. Slater, \u201cBiometric random number generators,\u201d Computers & Security, vol. 23, pp. 77\u201384, 2004.","journal-title":"Computers & Security"},{"key":"10_CR111","doi-asserted-by":"publisher","first-page":"3911","DOI":"10.3390\/s100403911","volume":"10","author":"SMK-u-R Raazi","year":"2010","unstructured":"S. M. K.-u.-R. Raazi, H. Lee, S. Lee, and Y.-K. Lee, \u201cBARI+: A biometric based distributed key management approach for wireless body area networks,\u201d Sensors, vol. 10, pp. 3911\u20133933, 2010.","journal-title":"Sensors"},{"key":"10_CR112","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1109\/MCOM.2006.1632652","volume":"44","author":"CC Poon","year":"2006","unstructured":"C. C. Poon, Y.-T. Zhang, and S.-D. Bao, \u201cA novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health,\u201d Communications Magazine, IEEE, vol. 44, pp. 73\u201381, 2006.","journal-title":"Communications Magazine, IEEE"},{"key":"10_CR113","doi-asserted-by":"publisher","first-page":"772","DOI":"10.1109\/TITB.2008.926434","volume":"12","author":"S-D Bao","year":"2008","unstructured":"S.-D. Bao, C. C. Poon, Y.-T. Zhang, and L.-F. Shen, \u201cUsing the timing information of heartbeats as an entity identifier to secure body sensor network,\u201d Information Technology in Biomedicine, IEEE Transactions on, vol. 12, pp. 772\u2013779, 2008.","journal-title":"Information Technology in Biomedicine, IEEE Transactions on"},{"key":"10_CR114","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/1777406.1777410","volume":"6","author":"KK Venkatasubramanian","year":"2010","unstructured":"K. K. Venkatasubramanian and S. K. Gupta, \u201cPhysiological value-based efficient usable security solutions for body sensor networks,\u201d ACM Transactions on Sensor Networks (TOSN), vol. 6, p. 31, 2010.","journal-title":"ACM Transactions on Sensor Networks (TOSN)"},{"key":"10_CR115","doi-asserted-by":"crossref","unstructured":"K. Cho and D. H. Lee, \u201cBiometric based secure communications without pre-deployed key for biosensor implanted in body sensor networks,\u201d in Information Security Applications, ed: Springer, 2012, pp. 203\u2013218.","DOI":"10.1007\/978-3-642-27890-7_17"},{"key":"10_CR116","doi-asserted-by":"crossref","unstructured":"W. Wang, H. Wang, M. Hempel, D. Peng, H. Sharif, and H.-H. Chen, \u201cSecure Stochastic ECG Signals Based on Gaussian Mixture Model for e-Healthcare Systems,\u201d 2011.","DOI":"10.1109\/JSYST.2011.2165597"},{"key":"10_CR117","doi-asserted-by":"crossref","unstructured":"K. K. Venkatasubramanian, A. Banerjee, and S. Gupta, \u201cPlethysmogram-based secure inter-sensor communication in body area networks,\u201d in Military Communications Conference, 2008. MILCOM 2008. IEEE, 2008, pp. 1\u20137.","DOI":"10.1109\/MILCOM.2008.4753199"},{"key":"10_CR118","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/TITB.2009.2037617","volume":"14","author":"KK Venkatasubramanian","year":"2010","unstructured":"K. K. Venkatasubramanian, A. Banerjee, and S. K. S. Gupta, \u201cPSKA: usable and secure key agreement scheme for body area networks,\u201d Information Technology in Biomedicine, IEEE Transactions on, vol. 14, pp. 60\u201368, 2010.","journal-title":"Information Technology in Biomedicine, IEEE Transactions on"},{"key":"10_CR119","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1109\/TITB.2011.2173946","volume":"16","author":"G-H Zhang","year":"2012","unstructured":"G.-H. Zhang, C. C. Poon, and Y.-T. Zhang, \u201cAnalysis of Using Interpulse Intervals to Generate 128-Bit Biometric Random Binary Sequences for Securing Wireless Body Sensor Networks,\u201d Information Technology in Biomedicine, IEEE Transactions on, vol. 16, pp. 176\u2013182, 2012.","journal-title":"Information Technology in Biomedicine, IEEE Transactions on"},{"key":"10_CR120","doi-asserted-by":"crossref","unstructured":"A. Banerjee, K. Venkatasubramanian, and S. K. Gupta, \u201cChallenges of implementing cyber-physical security solutions in body area networks,\u201d in Proceedings of the Fourth International Conference on Body Area Networks, 2009, p. 18.","DOI":"10.4108\/ICST.BODYNETS2009.6031"},{"key":"10_CR121","unstructured":"J. Inman, \u201cThe antibody combining region: speculations on the hypothesis of general multispecificity,\u201d in Theoretical Immunology, G. Bell, A. Perelson, and G. Pimbley, Eds., ed: Marcel Dekker, 1978, pp. 234\u2013278."},{"key":"10_CR122","unstructured":"B. Rensberger, \u201c In self-defense,\u201d in Life Itself, B. Rensberger, Ed., ed: Oxford University Press, 1996, pp. 212\u2013228."},{"key":"10_CR123","unstructured":"C. A. Janeway, P. Travers, M. Walport, and J. D. Capra, Immunobiology: the immune system in health and disease, 4th ed.: Garland Publishing, 1999."},{"key":"10_CR124","first-page":"45","volume":"7","author":"SA Hofmeyr","year":"2000","unstructured":"S. A. Hofmeyr and S. Forrest, \u201cArchitecture for an artificial immune system,\u201d Evolutionary Computation, vol. 7, pp. 45\u201368, 2000.","journal-title":"Evolutionary Computation"},{"key":"10_CR125","doi-asserted-by":"crossref","unstructured":"J. O. Kephart, \u201cBiologically inspired immune system for computers,\u201d in the Fourth International Workshop on Synthesis and Simulation of Living Systems, 1994, pp. 130\u2013139.","DOI":"10.7551\/mitpress\/1428.003.0017"},{"key":"10_CR126","unstructured":"S. Forrest, A. S. Perelson, L. Allen, and R. Cherukuri, \u201cSelf-nonself discrimination in a computer,\u201d in IEEE Symposium on Research in Security and Privacy, 1994."},{"key":"10_CR127","unstructured":"H. Nishiyama and F. Mizoguchi, \u201cDesign of security system based on immune system,\u201d in the Tenth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, ed, 2001."},{"key":"10_CR128","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1109\/TEVC.2002.1011540","volume":"6","author":"PK Harmer","year":"2002","unstructured":"P. K. Harmer, P. D. Williams, G. H. Gunsch, and G. B. Lamont, \u201cAn artificial immune system architecture for computer security applications,\u201d IEEE Transaction on Evolutionary Computation, vol. 6, pp. 252\u2013280, 2002.","journal-title":"IEEE Transaction on Evolutionary Computation"},{"key":"10_CR129","doi-asserted-by":"crossref","unstructured":"D. Ma and G. Tsudik, \u201cDish: Distributed self-healing,\u201d in Stabilization, Safety, and Security of Distributed Systems, ed: Springer, 2008, pp. 47\u201362.","DOI":"10.1007\/978-3-540-89335-6_7"}],"container-title":["Body Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4471-6374-9_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T11:47:53Z","timestamp":1746186473000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-1-4471-6374-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9781447163732","9781447163749"],"references-count":129,"URL":"https:\/\/doi.org\/10.1007\/978-1-4471-6374-9_10","relation":{},"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"12 March 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}