Author: Dr. Celestine Iwendi

Celestine Iwendi is a Sensor and Electronics Researcher at the University of Aberdeen, UK. He can be reached at celestine.iwendi@ieee.org

Will The Future Be Perfect?

The emergence and the implementation of Internet of Things (IoT) which brings the Internet, mobile and cloud computing into great light will bring lots of new micro-consumers into the fold and will reinvigorate the passion of innovation in industries. It…

Step-by-Step: Writing Contiki Programs

Hands –on simple instructions on how to program WSN motes on the Contiki operating system platform is illustrated here. This is one of the experiences I had while attending the CONET summer school of 2011 with the developers of Contiki.…

Collision Avoidance Systems Emerges

A cheap, small and portable sensor has been made by some US scientists to help the automobile Industry avoid collision. The scientists have used metamaterials to construct the imaging system, which samples infra-red and microwave light. This system which has…

AES Implementation on MicaZ with Contiki OS

Advanced Encryption Standard has been used to double the security of the MicaZ wireless sensor network nodes by the Wireless Sensor Network research group at the University of Aberdeen. We can recall that it was in the year 2001 that…

Wireless Sensor Networks with Contiki

The designers of operating systems for sensor nodes are often faced with the challenge of finding the right abstractions and lightweight mechanisms that offer a rich enough execution environment, while remaining within the system’s strict resource limitations. My hunt for…

Hot Research Areas in Wireless Sensor Networks

Are you thinking of a new direction for your research groups or something to add or expand what you are currently doing? We have got some things for you to ponder about. Unmanned Autonomous Aerial Vehicle Technologies Using WSN Experimental…

Java 7 Security Manager Bypass Vulnerability

The United States Computer Emergency Readiness Team (US-CERT) has issued a warning that hackers have figured out how to exploit Java vulnerabilities to install malicious software enabling them to commit crimes ranging from identity theft to making an infected computer…

Security Challenges for Wireless Sensor Networks

Wireless Sensor Systems deployments are security sensitive and attacks against them may lead to damage to health and safety of people. The biggest treat to WSS is Denial-of-service attack. These attacks are conditions for hardware failures, resource exhaustion, bugs, malicious…

PhD Student Tackles Hazardous Gases With Foam Sensor

A doctoral student from the Department of Mechanical, Aerospace and Nuclear Engineering at Rensselaer Polytechnic Institute, one of the America’s oldest technological research university, Fazel Yavari  has developed a new sensor that detects extremely small quantities of hazardous gases. The…