B-LEACH: A Clustering Protocol for Wireless Sensor Networks based on Bacterial Foraging Algorithm Bhavana Adiga Abstract: Wireless sensor networks [WSN] are popular as they are potentially low cost solution to various real world challenges. Environment is monitored by the autonomous…
Month: July 2015
Security against Physical Attacks Using Physical Unclonable Functions (PUFs)
Few years ago, sophisticated physical and aggressive attacks have evolved to recover secrets from integrated circuits. This poses a threat to smart cards, RFID tags, FPGA implementations, WSN and many other applications which rely on secrets stored inside a digital…
Function–Based Security in RFID Systems
Physically Unclonable Function–Based Security and Privacy in RFID Systems. [gview file=”http://www.wsnmagazine.com/wp-content/uploads/2015/07/rfid.pdf”]
IoT Wireless Sensors and the Problem of Short Battery Life
Abstract: Wireless sensors are going to introduce huge changes to monitoring environmental parameters and industrial installations. Today, sensor installation and wiring constraints block widespread adoption. With battery-powered devices, the Internet of Things can become a true reality — as soon…