Hands –on simple instructions on how to program WSN motes on the Contiki operating system platform is illustrated here. This is one of the experiences I had while attending the CONET summer school of 2011 with the developers of Contiki.…
Author: Dr. Celestine Iwendi
Celestine Iwendi is a Sensor and Electronics Researcher at the University of Aberdeen, UK. He can be reached at celestine.iwendi@ieee.org
Collision Avoidance Systems Emerges
A cheap, small and portable sensor has been made by some US scientists to help the automobile Industry avoid collision. The scientists have used metamaterials to construct the imaging system, which samples infra-red and microwave light. This system which has…
AES Implementation on MicaZ with Contiki OS
Advanced Encryption Standard has been used to double the security of the MicaZ wireless sensor network nodes by the Wireless Sensor Network research group at the University of Aberdeen. We can recall that it was in the year 2001 that…
Internet – of –Things: Next Advancement of the Internet
Will China become the Game changer? Cisco Systems futurist Dave Evans predicts that the Internet of Things (IoT) will link approximately 50 billion machines and devices by 2020. His vision is a world of networked smart devices equipped with sensors…
Wireless Sensor Networks with Contiki
The designers of operating systems for sensor nodes are often faced with the challenge of finding the right abstractions and lightweight mechanisms that offer a rich enough execution environment, while remaining within the system’s strict resource limitations. My hunt for…
Hot Research Areas in Wireless Sensor Networks
Are you thinking of a new direction for your research groups or something to add or expand what you are currently doing? We have got some things for you to ponder about. Unmanned Autonomous Aerial Vehicle Technologies Using WSN Experimental…
Java 7 Security Manager Bypass Vulnerability
The United States Computer Emergency Readiness Team (US-CERT) has issued a warning that hackers have figured out how to exploit Java vulnerabilities to install malicious software enabling them to commit crimes ranging from identity theft to making an infected computer…
Security Challenges for Wireless Sensor Networks
Wireless Sensor Systems deployments are security sensitive and attacks against them may lead to damage to health and safety of people. The biggest treat to WSS is Denial-of-service attack. These attacks are conditions for hardware failures, resource exhaustion, bugs, malicious…
PhD Student Tackles Hazardous Gases With Foam Sensor
A doctoral student from the Department of Mechanical, Aerospace and Nuclear Engineering at Rensselaer Polytechnic Institute, one of the America’s oldest technological research university, Fazel Yavari has developed a new sensor that detects extremely small quantities of hazardous gases. The…
Internet of Things Gets Boost From ZigBee
Texas Instruments Incorporated (TI) has announced CC2538 what seems to be the first Industry’s 3-in-1 network processor that offer the three most popular ZigBee standards for one-end user and could aid the future Internet of Things deployment. According to the…