Category: WSN Applications

WSN Made Easy With Arduino Platform?

This article will help you to understand some of the easiest methods to start implementing your sensor nodes with an Arduino platform. Many students and organisation tends to be frustrated with the licensing issues and the cost of buying sensor…

Student Guide: Principles of Wireless Sensor Networks

This is to help undergraduate student and others to understand the Principles of Wireless Sensor Network. We all know that WSNs have the potential of dwarfing the revolution that the Internet has brought to the world of computing, entertainment, work,…

Energy Conservation in WSN Nodes Security Application

Energy conservation is one of the challenging issue among numerous stringent requirements for the implementation of WSN security using key management. There are many ongoing research aimed at realising a practical and robust keying model that tends to address this problems.…

WSN for Smart Infrastructures: Business Prospects

Europe is on track for a large scale investment that will create a sustainable transport network with a project called “Connecting Europe Facility, aimed at increasing the benefits of pan-European freight and passenger traffic infrastructure projects. The Fund will have…

Java 7 Security Manager Bypass Vulnerability

The United States Computer Emergency Readiness Team (US-CERT) has issued a warning that hackers have figured out how to exploit Java vulnerabilities to install malicious software enabling them to commit crimes ranging from identity theft to making an infected computer…

Wireless Sensor Network for Underwater Communication

About the presentation Although, attenuation in Electromagnetic (EM) wave propagation underwater is high at high frequencies, the theory predicts that propagation is possible at some useful distance in the lower Industrial, Scientific and Medical (ISM) band.The aim of this paper…

Wireless Sensor Networks: Technology and Applications

Wireless sensor network encompasses the characteristics of authentication, privacy, integrity, non-repudiation, and anti-play back. The greater the dependency of information sent or received in the network, the greater the security risks. Various security issues have been considered in ad hoc…