International Journal of P2P
Network Trends and Technology

Research Article | Open Access | Download PDF
Volume 2 | Issue 6 | Year 2012 | Article Id. IJPTT-V2I6P404 | DOI : https://doi.org/10.14445/22492615/IJPTT-V2I6P404

Methodology for Artificial Immune Systems and Immune Pathology


Akash K Singh

Citation :

Akash K Singh, "Methodology for Artificial Immune Systems and Immune Pathology," International Journal of P2P Network Trends and Technology (IJPTT), vol. 2, no. 6, pp. 94-126, 2012. Crossref, https://doi.org/10.14445/22492615/IJPTT-V2I6P404

Abstract

Artificial immune system (AIS) mimics the superior properties of biological immune system and provides an effective method in intelligent computing and intelligent system designing. But the disease-causing mechanisms of immune pathology have led to sever security problems in artificial immune system. In the paper, we analyzed the basic principles of immune protection and immune pathology of biological system considering its application in artificial immune system. Then we take artificial immune defending system as an example to analyze the cause and potential influence of immune pathology on AIS. As to the different security problems from immunodeficiency, hypersensitivity and autoimmunity, we put forward corresponding measures to reinforce the security, robustness and stability of artificial immune system and thus effectively avoid these problems.

Keywords

Immune pathology; artificial immune system; negative selection algorithm; immunodeficiency; system Efficiency

References

[1] Akash Singh, “Trust and Trust Management Models for Ecommerce & Sensor Network”, International Journal of Engineering Research and Applications (IJERA) (2012)
[2] Akash Singh, “Trust Management and Security Access Controls in High Payload System Architecture”, International Journal of Engineering Research and Applications (IJERA) (2012)
[3] Akash Singh, “Upper Bound and HRU Access Matrix Model”, International Journal of Engineering Research and Applications (IJERA) (2012)
[4] Akash Singh, “Smart Grid Cloud”, International Journal of Engineering Research and Applications (IJERA) (2012)
[5] Akash Singh, “Smart Grid Dynamic Pricing”, International Journal of Engineering Research and Applications (IJERA) (2012)
[6] Akash Singh, “Smart Grid Load Forecasting”, International Journal of Engineering Research and Applications (IJERA) (2012)
[7] Akash Singh, “Service Oriented Computing”, International Journal of Engineering Research and Applications (IJERA) (2012)
[8] Akash Singh, “Smart Access Control Model”, International Journal of Engineering Research and Applications (IJERA) (2012)
[9] Akash Singh, “Smart Grid Architecture”, International Journal of Engineering Research and Applications (IJERA) (2012)
[10] Akash Singh, “Runtime Processes and Trust Management Model in MANET and GRID”, International Journal of Engineering Research and Applications (IJERA) (2012)
[11] Akash Singh, “Smart Grid Sensor”, International Journal of Engineering Research and Applications (IJERA) (2012)
[12] Akash Singh, “Smart Grid Voltage Regulations”, International Journal of Engineering Research and Applications (IJERA) (2012)
[13] Akash Singh, “Smart Grid Wide Area Monitoring, Protection and Control”, International Journal of Engineering Research and Applications (IJERA) (2012)
[14] Akash Singh, “Smart Microgrid”, International Journal of Engineering Research and Applications (IJERA) (2012)
[15] Akash Singh, “Standards for Smart Grid”, International Journal of Engineering Research and Applications (IJERA) (2012)
[16] Akash Singh, “THz Medical Imaging”, International Journal of Engineering Research and Applications (IJERA) (2012)
[17] Akash Singh, “Technology in Education and Training”, International Journal of Engineering Research and Applications (IJERA) (2012)
[18] Akash Singh, “Progress in Intracoronary Optical Coherence Tomography”, International Journal of Engineering Research and Applications (IJERA) (2012)
[19] Akash Singh, “Prostate Cancer Detection and Localization”, International Journal of Engineering Research and Applications (IJERA) (2012)
[20] Akash Singh, “Quantum-Dot Laser OCT”, International Journal of Engineering Research and Applications (IJERA) (2012)
[21] Akash Singh, “Prosthetic Hand Control”, International Journal of Engineering Research and Applications (IJERA) (2012)
[22] Akash Singh, “Real-time Control of Angioplasty Balloon Inflation for Beating Heart Model”, International Journal of Engineering Research and Applications (IJERA) (2012)
[23] Akash Singh, “Real-Time Isometric Pinch Force Prediction from sEMG”, International Journal of Engineering Research and Applications (IJERA) (2012)
[24] Akash Singh, “Replacement of Hand Function”, International Journal of Engineering Research and Applications (IJERA) (2012)
[25] Akash Singh, “Reputation Based Distributed Trust Model for P2P Networks”, International Journal of Engineering Research and Applications (IJERA) (2012)
[26] Akash Singh, “Robotics as a Future and Emerging Technology”, International Journal of Engineering Research and Applications (IJERA) (2012)
[27] Akash Singh, “Role Based Trust Management Security Policy Analysis”, International Journal of Engineering Research and Applications (IJERA) (2012)
[28] Akash Singh, “Neural Response”, International Journal of Engineering Research and Applications (IJERA) (2012)
[29] Akash Singh, “OCT Based Nanostructures Quantification”, International Journal of Engineering Research and Applications (IJERA) (2012)
[30] Akash Singh, “Optical Coherence Tomography for Ophthalmic Imaging”, International Journal of Engineering Research and Applications (IJERA) (2012)
[31] Akash Singh, “Optimal QoS Attributes in Security Key Management”, International Journal of Engineering Research and Applications (IJERA) (2012) [32] Akash Singh, “THz Medical Imaging”, International Journal of Computational Engineering Research (IJCER) (2012)
[33] Akash Singh, “Trust Management and Security Access Controls in High Payload System Architecture”, International Journal of Computational Engineering Research (IJCER) (2012)
[34] Akash Singh, “Technology in Education and Training”, International Journal of Computational Engineering Research (IJCER) (2012)
[35] Akash Singh, “Standards for Smart Grid”, International Journal of Computational Engineering Research (IJCER) (2012)
[36] Akash Singh, “Smart Microgrid”, International Journal of Computational Engineering Research (IJCER) (2012)
[37] Akash Singh, “Smart Grid Wide Area Monitoring, Protection and Control”, International Journal of Computational Engineering Research (IJCER) (2012)
[38] Akash Singh, “Smart Grid Voltage Regulations”, International Journal of Computational Engineering Research (IJCER) (2012)
[39] Akash Singh, “Smart Grid Load Forecasting”, International Journal of Computational Engineering Research (IJCER) (2012)
[40] Akash Singh, “Smart Grid Dynamic Pricing”, International Journal of Computational Engineering Research (IJCER) (2012)
[41] Akash Singh, “Smart Grid Architecture”, International Journal of Computational Engineering Research (IJCER) (2012)
[42] Akash Singh, “Smart Access Control Model”, International Journal of Computational Engineering Research (IJCER) (2012)
[43] Akash Singh, “Service Oriented Computing”, International Journal of Computational Engineering Research (IJCER) (2012)
[44] Akash Singh, “Role Based Trust Management Security Policy Analysis”, International Journal of Computational Engineering Research (IJCER) (2012) [45] Akash Singh, “Robotics as a Future and Emerging Technology”, International Journal of Computational Engineering Research (IJCER) (2012)
[46] Akash Singh, “Reputation Based Distributed Trust Model for P2P Networks”, International Journal of Computational Engineering Research (IJCER) (2012)
[47] Akash Singh, “Replacement of Hand Function”, International Journal of Computational Engineering Research (IJCER) (2012)
[48] Akash Singh, “Real-Time Isometric Pinch Force Prediction from sEMG”, International Journal of Computational Engineering Research (IJCER) (2012) [49] Akash Singh, “Real-time Control of Angioplasty Balloon Inflation for Beating Heart Model”, International Journal of Computational Engineering Research (IJCER) (2012)
[50] Akash Singh, “Quantum-Dot Laser OCT”, International Journal of Computational Engineering Research (IJCER) (2012)
[51] Akash Singh, “Prosthetic Hand Control”, International Journal of Computational Engineering Research (IJCER) (2012)
[52] Akash Singh, “Prostate Cancer Detection and Localization”, International Journal of Computational Engineering Research (IJCER) (2012)
[53] Akash Singh, “Smart Grid Cloud”, International Journal of Computational Engineering Research (IJCER) (2012)
[54] Akash Singh, “Smart Grid Sensor”, International Journal of Computational Engineering Research (IJCER) (2012)
[55] Akash Singh, “Runtime Processes and Trust Management Model in MANET and GRID”, International Journal of Computational Engineering Research (IJCER) (2012)
[56] Akash Singh, “Trust and Trust Management Models for Ecommerce & Sensor Network”, International Journal of Computational Engineering Research (IJCER) (2012)
[57] Akash Singh, “Trust Management and Security Access Controls in High Payload System Architecture”, International Journal of Computational Engineering Research (IJCER) (2012)
[58] Akash Singh, “Upper Bound and HRU Access Matrix Model”, International Journal of Computational Engineering Research (IJCER) (2012)
[59] Akash Singh, “Progress in Intracoronary Optical Coherence Tomography”, International Journal of Computational Engineering Research (IJCER) (2012)
[60] Akash Singh, “Optical Coherence Tomography for Ophthalmic Imaging”, International Journal of Computational Engineering Research (IJCER) (2012)
[61] Akash Singh, “Optimal QoS Attributes in Security Key Management”, International Journal of Computational Engineering Research (IJCER) (2012) [62] Akash Singh, “Neural Response”, International Journal of Computational Engineering Research (IJCER) (2012)
[63] Akash Singh, “OCT Based Nanostructures Quantification”, International Journal of Computational Engineering Research (IJCER) (2012)
[64] Akash Singh, "Endoscopic Optical Coherence Tomography”, International Journal of Applied Engineering and Technology(IJET) (2012)
[65] Akash Singh, "THz Medical Imaging”, International Journal of Applied Engineering and Technology(IJET)
[66] Akash Singh, "Global Optimization and Integer Programming Networks”, International Journal of Information and Communication Technology Research (IJICTR) (2012)
[67] Akash Singh, "Ajax Asynchronous Database Refresh”, International Journal of Information and Communication Technology Research (IJICTR) (2012) [68] Akash Singh, "Applied Mathematics To Approximate Cancer Growth”, International Journal of Soft Computing and Engineering (IJSCE) (2012)
[69] Akash Singh, “Ajax Asynchronous Database Refresh and simulation study”, International Journal of Information Technology and Network Application (IJITNA) (2012)
[70] Akash Singh, Artificial Intelligent Bionic Devices with machine learning framework”, International Journal of Computer Science and Management Studies (IJCSMS) (2012)
[71] Akash Singh, Security Framework and Asymptotic Security Key Generation and Distribution Algorithm, International Journal of Computer Science and Management Studies (IJCSMS)
[72] Akash Singh, "Enterprise Architecture with Authentication Trust Level Network Architecture”, International Journal of Computer Science and Management Studies (IJCSMS) [73] Akash Singh, "Bionic Feet”, International Journal of Computer Science and Management Studies (IJCSMS) (2012)
[74] Akash Singh, "Human Bionic Manipulator", International Journal of Computer Science and Management Studies (IJCSMS) (2012)
[75] Akash Singh, "Simulation and Framework for Artificial Intelligent Bionic Devices”, International Journal of Informatics and Communication Technology (IJ-ICT) (2012)
[76] Akash Singh, Single Sign on and Integrated Asymptotic Security Key Generation and Distribution Algorithm, International Journal of Informatics and Communication Technology (IJ-ICT) (2012)
[77] Akash Singh, Physical and Logical Security Framework with Authentication Trust Level Network Architecture, International Journal of Informatics and Communication Technology (IJ-ICT) (2012)
[78] Akash Singh, Cluster Neuron Bionic Feet, International Journal of Informatics and Communication Technology (IJ-ICT) (2012)
[79] Akash Singh, Robotic Bionic Manipulator, International Journal of Informatics and Communication Technology (IJ-ICT) (2012)
[80] Akash Singh, "Internet IP Anycast Architecture for Internet of Things & Cloud Computing ",International Journal of Computer Technology and Applications (IJCTA) (2012)
[81] Akash Singh, Artificial Immune Systems and its implementation in Pattern Recognition, International Journal of Computer Technology and Applications (IJCTA) (2012)
[82] Akash Singh, Adaptive Neural Networks and Random Distribution tools for Cancer Tissue Detection and Localization with Random multivariable and Simulation study of Cancer cells, International Journal of Computer Technology and Applications (IJCTA) (2012)
[83] Akash Singh, "Ajax Complexity and cognitive Radio Communication with underlying Enterprise Architecture
[84] ",International Journal of Computer Technology and Applications (IJCTA) (2012)
[85] Akash Singh, "Analytical Technique and Numerical Simulation of Brain Cancer and Nervous Cancer Population ",International Journal of Computer Technology and Applications (IJCTA) (2012)
[86] Akash Singh, "IP Anycast Architecture ",International Journal of Computer & organization Trends(IJCOT) (2012)
[87] Akash Singh, Asymptotic Security Key Generation and Distribution Algorithm, International Journal of Computer & organization Trends(IJCOT) (2012)
[88] Akash Singh, Bionic Manipulator, International Journal of Computer & organization Trends(IJCOT) (2012)
[89] Akash Singh, Ajax Complexity, International Journal of Computer & organization Trends(IJCOT) (2012)
[90] Akash Singh, "Analysis of Brain Cancer and Nervous Cancer Population with Age and Brain Cancer Type in North America ",International Journal of Computer & organization Trends(IJCOT) (2012)
[91] Akash Singh, "Artificial Intelligent Bionic Devices”, International Journal of P2P Network Trends and Technology(IJPTT) (2012
[92] Akash Singh, "Authentication Trust Level Network Architecture”, International Journal of P2P Network Trends and Technology(IJPTT) (2012)
[93] Akash Singh, "Adaptive Neural Networks and Random Distribution for Cancer Tissue Detection and Localization with Random multivariable ",International Journal of P2P Network Trends and Technology(IJPTT) (2012)
[94] Akash Singh, "Artificial Immune Systems”, International Journal of P2P Network Trends and Technology(IJPTT) (2012)
[95] Akash Singh, “Modeling of IP Anycast Architecture”, International Journal of Computer Networks and Wireless Communications (IJCNWC) (2012) [96] Akash Singh, “Adaptive Neural Networks and Machine Learning for Cancer Tissue Detection and Localization”, International Journal of Computer Networks and Wireless Communications (IJCNWC) (2012)
[97] Akash Singh, "Nervous Cancer Population in North America”, International Journal of Computer Networks and Wireless Communications (IJCNWC) (2012)
[98] Akash Singh, “Cancer Detection”, International Journal of Computer Networks and Wireless Communications (IJCNWC) (2012)
[99] Akash Singh, “Cancer Localization ", Journal of Computer Science & Systems Biology (JCSSB) (2012)
[100] Akash Singh, “Software based Artificial Immune Systems", Journal of Computer Science & Systems Biology (JCSSB) (2012)
[101] Akash Singh, “Ultra Bionic Manipulator", Journal of Computer Science & Systems Biology (JCSSB) (2012)
[102] Akash Singh, Design of Artificial Intelligent Bionic Devices, International Journal of Research in Computer and Communication Technology (IJRCCT) (2012)
[103] Akash Singh, “Modeling and Structure for Artificial Intelligent Bionic Devices”, International Journal of Research in Computer and Communication Technology (IJRCCT) (2012)
[104] Akash Singh, “Security landscape for Asymptotic Security Key Generation and Distribution Algorithm”, International Journal of Research in Computer and Communication Technology (IJRCCT) (2012)
[105] Akash Singh, “System Authentication Trust Level Network Architecture”, International Journal of Research in Computer and Communication Technology (IJRCCT) (2012)
[106] Akash Singh, “Bionic Feet for warfare”, International Journal of Research in Computer and Communication Technology (IJRCCT) (2012)
[107] Akash Singh, “Bionic Manipulator in the surgery”, International Journal of Research in Computer and Communication Technology (IJRCCT) (2012) [108] Akash Singh,"Anycast Architecture in Telecommunication”, International Journal of Research in Computer and Communication Technology (IJRCCT) (2012)
[109] Akash Singh, “Artificial Immune Systems in Software Engineering”, International Journal of Research in Computer and Communication Technology (IJRCCT) (2012)
[110] Akash Singh, “Random Distribution for Cancer Tissue Detection”, International Journal of Research in Computer and Communication Technology (IJRCCT) (2012)
[111] Akash Singh, “Ajax Complexity in Application Architecture”, International Journal of Research in Computer and Communication Technology (IJRCCT) (2012)
[112] Akash Singh, “Analysis of Brain Cancer”, International Journal of Research in Computer and Communication Technology (IJRCCT) (2012)
[113] Akash Singh, “Statistical Distribution for Cancer Tissue Detection", International Journal of Computer Science and Network Security " (IJCSNS) (2012)
[114] Akash Singh, “Artificial Intelligent Bionic Devices Design and Simulation Study", (IJCSN) (2012)
[115] Akash Singh, “Asymptotic Security Key Generation and Distribution Algorithm for Distributed Cloud Computing"(IJCSN) (2012) [116] Akash Singh, “Bionic Feet Design and Kinematics",(IJCSN) (2012)
[117] Akash Singh, “Bionic Manipulator",(IJCSN) (2012)
[118] Akash Singh, “Mobile Computing IP Anycast Architecture International Journal of Computer Networking", Wireless and Mobile Communications (IJCNWMC) (2012)
[119] Akash Singh, “Architecture for Software based Artificial Immune Systems", International Journal of Electronics, Communication & Instrumentation Engineering Research and Development (IJECIERD) (2012)
[120] Akash Singh, “Cancer Detection and Localization using statistical techniques", International Journal of Medicine and Pharmaceutical Sciences (IJMPS) (2012)
[121] Akash Singh,” Internet of Things with Ajax platform", International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR) (2012)
[122] Akash Singh, “Brain Cancer Detection Approach", International Journal of Medicine and Pharmaceutical Sciences (IJMPS) (2012)
[123] Akash Singh, “Artificial Intelligent Bionic Devices implementation", International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE) (2012)
[124] Akash Singh, “Artificial Intelligent Bionic Devices Modeling", International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE)
[125] Akash Singh, “Artificial Intelligent Bionic Devices Mathematical framework", International Journal of Advances in Computer Science and its Application (IJACSA) (2012)}
[126] Akash Singh, “Authentication Trust Level Network Architecture in Healthcare", International Journal of Advances in Computer Science and its Application (IJACSA) (2012)
[127] Akash Singh, “Bionic Feet for Amputated", International Journal of Advances in Computer Science and its Application (IJACSA) (2012)
[128] Akash Singh, “Bionic Manipulator in Robotics", International Journal of Advances in Computer Science and its Application (IJACSA) (2012)
[130] Akash Singh, “Asymptotic Security Key Generation and Distribution Algorithm and association with Enterprise Architecture", International Journal of Advances in Computer Science and its Application (IJACSA) (2012)
[131] Dynamics and Control of Large Electric Power Systems. Ilic, M. and Zaborszky, J. John Wiley & Sons, Inc. © 2000, p. 756.
[132] Modeling and Evaluation of Intrusion Tolerant Systems Based on Dynamic Diversity Backups. Meng, K. et al. Proceedings of the 2009 International Symposium on Information Processing (ISIP’09). Huangshan, P. R. China, August 21-23, 2009, pp. 101–104
[133] Characterizing Intrusion Tolerant Systems Using A State Transition Model. Gong, F. et al., April 24, 2010.
[134] Energy Assurance Daily, September 27, 2007. U.S. Department of Energy, Office of Electricity Delivery and Energy Reliability, Infrastructure Security and Energy Restoration Division. April 25, 2010.
[135] CENTIBOTS Large Scale Robot Teams. Konoledge, Kurt et al. Artificial Intelligence Center, SRI International, Menlo Park, CA 2003.
[136] Handling Communication Restrictions and Team Formation in Congestion Games, Agogino, A. and Tumer, K. Journal of Autonomous Agents and Multi Agent Systems, 13(1):97–115, 2006.
[137] Robotics and Autonomous Systems Research, School of Mechanical, Industrial and Manufacturing Engineering, College of Engineering, Oregon State University.
[138] D. Dietrich, D. Bruckner, G. Zucker, and P. Palensky, “Communication and computation in buildings: A short introduction and overview,” IEEE Trans. Ind. Electron., vol. 57, no. 11, pp. 3577–3584, Nov. 2010.
[139] V. C. Gungor and F. C. Lambert, “A survey on communication networks for electric system automation,” Comput. Networks, vol. 50, pp. 877–897, May 2006.
[140] S. Paudyal, C. Canizares, and K. Bhattacharya, “Optimal operation of distribution feeders in smart grids,” IEEE Trans. Ind. Electron., vol. 58, no. 10, pp. 4495–4503, Oct. 2011.
[141] D. M. Laverty, D. J. Morrow, R. Best, and P. A. Crossley, “Telecommunications for smart grid: Backhaul solutions for the distribution network,” in Proc. IEEE Power and Energy Society General Meeting, Jul. 25–29, 2010, pp. 1– 6.
[142] L. Wenpeng, D. Sharp, and S. Lancashire, “Smart grid communication network capacity planning for power utilities,” in Proc. IEEE PES, Transmission Distrib. Conf. Expo., Apr. 19–22, 2010, pp. 1–4.
[143] Y. Peizhong, A. Iwayemi, and C. Zhou, “Developing ZigBee deployment guideline under WiFi interference for smart grid applications,” IEEE Trans. Smart Grid, vol. 2, no. 1, pp. 110–120, Mar. 2011.
[144] C. Gezer and C. Buratti, “A ZigBee smart energy implementation for energy efficient buildings,” in Proc. IEEE 73rd Veh. Technol. Conf. (VTC Spring), May 15–18, 2011, pp. 1–5.
[145] R. P. Lewis, P. Igic, and Z. Zhongfu, “Assessment of communication methods for smart electricity metering in the U.K.,” in Proc. IEEE PES/IAS Conf. Sustainable Alternative Energy (SAE), Sep. 2009, pp. 1–4.
[146] A. Yarali, “Wireless mesh networking technology for commercial and industrial customers,” in Proc. Elect. Comput. Eng., CCECE,May 1–4, 2008, pp. 000047–000052.
[147] M. Y. Zhai, “Transmission characteristics of lowvoltage distribution networks in China under the smart grids environment,” IEEE Trans. Power Delivery, vol. 26, no. 1, pp. 173–180, Jan. 2011.
[148] V. Paruchuri, A. Durresi, and M. Ramesh, “Securing powerline communications,” in Proc. IEEE Int. Symp. Power Line Commun. Appl., (ISPLC), Apr. 2–4, 2008, pp. 64–69.
[149] Q.Yang, J. A. Barria, and T. C. Green, “Communication infrastructures for distributed control of power distribution networks,” IEEE Trans. Ind. Inform., vol. 7, no. 2, pp. 316– 327, May 2011.
[150] T. Sauter and M. Lobashov, “End-to-end communication architecture for smart grids,” IEEE Trans. Ind. Electron., vol. 58, no. 4, pp. 1218–1228, Apr. 2011.
[151] K. Moslehi and R. Kumar, “Smart grid—A reliability perspective,” Innovative Smart Grid Technologies (ISGT), pp. 1–8, Jan. 19–21, 2010.
[152] Southern Company Services, Inc., “Comments request for information on smart grid communications requirements,” Jul. 2010
[153] R. Bo and F. Li, “Probabilistic LMP forecasting considering load uncertainty,” IEEE Trans. Power Syst., vol. 24, pp. 1279–1289, Aug. 2009.
[154] Power Line Communications, H. Ferreira, L. Lampe, J. Newbury, and T. Swart (Editors), Eds. New York: Wiley, 2010.
[155] G. Bumiller, “Single frequency network technology for fast ad hoc communication networks over power lines,” WiKu-Wissenschaftsverlag Dr. Stein 2010.
[156] G. Bumiller, L. Lampe, and H. Hrasnica, “Power line communications for large-scale control and automation systems,” IEEE Commun. Mag., vol. 48, no. 4, pp. 106–113, Apr. 2010.
[157] M. Biagi and L. Lampe, “Location assisted routing techniques for power line communication in smart grids,” in Proc. IEEE Int. Conf. Smart Grid Commun., 2010, pp. 274– 278.
[158] J. Sanchez, P. Ruiz, and R. Marin-Perez, “Beacon-less geographic routing made partical: Challenges, design guidelines and protocols,” IEEE Commun. Mag., vol. 47, no. 8, pp. 85–91, Aug. 2009.
[159] N. Bressan, L. Bazzaco, N. Bui, P. Casari, L. Vangelista, and M. Zorzi, “The deployment of a smart monitoring system using wireless sensors and actuators networks,” in Proc. IEEE Int. Conf. Smart Grid Commun. (SmartGridComm), 2010, pp. 49–54.
[160] S. Dawson-Haggerty, A. Tavakoli, and D. Culler, “Hydro: A hybrid routing protocol for low-power and lossy networks,” in Proc. IEEE Int. Conf. Smart Grid Commun. (SmartGridComm), 2010, pp. 268–273.
[161] S. Goldfisher and S. J. Tanabe, “IEEE 1901 access system: An overview of its uniqueness and motivation,” IEEE Commun. Mag., vol. 48, no. 10, pp. 150–157, Oct. 2010.
[162] V. C. Gungor, D. Sahin, T. Kocak, and S. Ergüt, “Smart grid communications and networking,” Türk Telekom, Tech. Rep. 11316-01, Apr 2011.