Category: Technical Articles

Technical papers written in the field of wireless sensor networks

Hot Research Areas in Wireless Sensor Networks

Are you thinking of a new direction for your research groups or something to add or expand what you are currently doing? We have got some things for you to ponder about. Unmanned Autonomous Aerial Vehicle Technologies Using WSN Experimental…

Java 7 Security Manager Bypass Vulnerability

The United States Computer Emergency Readiness Team (US-CERT) has issued a warning that hackers have figured out how to exploit Java vulnerabilities to install malicious software enabling them to commit crimes ranging from identity theft to making an infected computer…

Security Challenges for Wireless Sensor Networks

Wireless Sensor Systems deployments are security sensitive and attacks against them may lead to damage to health and safety of people. The biggest treat to WSS is Denial-of-service attack. These attacks are conditions for hardware failures, resource exhaustion, bugs, malicious…

Internet of Things Gets Boost From ZigBee

Texas Instruments Incorporated (TI) has announced CC2538 what seems to be the first Industry’s 3-in-1 network processor that offer the three most popular ZigBee standards for one-end user and could aid the future Internet of Things deployment. According to the…

3D Sensing and Communication in Hazardous Places

Node positioning and deployment in hazardous places have numerous set back. In this article I intend to show the challenges that are currently been experience for wireless sensor experts. The scope covered so far on node positioning has been two-dimensional…

Wireless Sensor Network for Underwater Communication

About the presentation Although, attenuation in Electromagnetic (EM) wave propagation underwater is high at high frequencies, the theory predicts that propagation is possible at some useful distance in the lower Industrial, Scientific and Medical (ISM) band.The aim of this paper…

Connect or Die: Can M2M save the world?

About the presentation Iain will explore some Machine 2 Machine (M2M) applications which could help improve quality of life as well as saving time, energy and money. “Networks” will be key to making it happen, in more ways than you…

Enhanced Security Technique For WSN Nodes

Enhanced Security Technique For Wireless Sensor Network Nodes Wireless sensor network (WSN) have become a complete solution in making use of low power implementation and embedded systems. Many different security protocols have been proposed that allow some form of security…

Wireless Sensor Networks: Technology and Applications

Wireless sensor network encompasses the characteristics of authentication, privacy, integrity, non-repudiation, and anti-play back. The greater the dependency of information sent or received in the network, the greater the security risks. Various security issues have been considered in ad hoc…