Category: Technical Articles

Technical papers written in the field of wireless sensor networks

Step-by-Step: Writing Contiki Programs

Hands –on simple instructions on how to program WSN motes on the Contiki operating system platform is illustrated here. This is one of the experiences I had while attending the CONET summer school of 2011 with the developers of Contiki.…

AES Implementation on MicaZ with Contiki OS

Advanced Encryption Standard has been used to double the security of the MicaZ wireless sensor network nodes by the Wireless Sensor Network research group at the University of Aberdeen. We can recall that it was in the year 2001 that…

Wireless Sensor Networks with Contiki

The designers of operating systems for sensor nodes are often faced with the challenge of finding the right abstractions and lightweight mechanisms that offer a rich enough execution environment, while remaining within the system’s strict resource limitations. My hunt for…

Hot Research Areas in Wireless Sensor Networks

Are you thinking of a new direction for your research groups or something to add or expand what you are currently doing? We have got some things for you to ponder about. Unmanned Autonomous Aerial Vehicle Technologies Using WSN Experimental…

Java 7 Security Manager Bypass Vulnerability

The United States Computer Emergency Readiness Team (US-CERT) has issued a warning that hackers have figured out how to exploit Java vulnerabilities to install malicious software enabling them to commit crimes ranging from identity theft to making an infected computer…

Security Challenges for Wireless Sensor Networks

Wireless Sensor Systems deployments are security sensitive and attacks against them may lead to damage to health and safety of people. The biggest treat to WSS is Denial-of-service attack. These attacks are conditions for hardware failures, resource exhaustion, bugs, malicious…

Internet of Things Gets Boost From ZigBee

Texas Instruments Incorporated (TI) has announced CC2538 what seems to be the first Industry’s 3-in-1 network processor that offer the three most popular ZigBee standards for one-end user and could aid the future Internet of Things deployment. According to the…

3D Sensing and Communication in Hazardous Places

Node positioning and deployment in hazardous places have numerous set back. In this article I intend to show the challenges that are currently been experience for wireless sensor experts. The scope covered so far on node positioning has been two-dimensional…

Wireless Sensor Network for Underwater Communication

About the presentation Although, attenuation in Electromagnetic (EM) wave propagation underwater is high at high frequencies, the theory predicts that propagation is possible at some useful distance in the lower Industrial, Scientific and Medical (ISM) band.The aim of this paper…