Spider-Monkey Technique has been used by some researchers to detect Sybil attacks in Large Scale VANETS. According to the researchers, Celestine Iwendi ; Mueen Uddin ; James A. Ansere ; P. Nkurunziza ; J. H. Anajemba ; Ali Kashif Bashir “Vehicles attacked by malicious nodes usually cause time synchronization error…
Category: Technical Articles
Technical papers written in the field of wireless sensor networks
Japanese tree frogs demonstrate Multi-hop communication in wireless sensor networks
Balancing Usability and Cybersecurity in IoT Devices
[gview file=”http://www.wsnmagazine.com/wp-content/uploads/2018/04/sdmwebinarapril24.pdf”] About the Presentation The Internet of Things (IoT) is growing fast, with web-enabled devices now helping people to monitor their health, upgrade their cars, and control home heating—remotely. Yet, these advances come with increasing security risks. The technology…
ACO Based KMT Mechanism for WSN Security and Data Collection
[gview file=”http://www.wsnmagazine.com/wp-content/uploads/2018/02/cele.pdf”]
Analysis of Frequency Characteristic of SPM Synchronous Machine
[gview file=”http://www.wsnmagazine.com/wp-content/uploads/2018/02/shoushou.pdf”]
Sensor Based Projects Ideas
All these projects can give you deeper understanding how sensors can be use in everyday life. Accident Prevention Using Eye Blinking and Head Movement: The main aim of this project is to avoid the accidents that are caused due to…
ICIT 2018: WIRELESS SENSOR NETWORKS: HARDWARE/SOFTWARE DESIGN ASPECTS FOR INDUSTRY
[gview file=”http://www.wsnmagazine.com/wp-content/uploads/2017/08/SS_4_ICIT2018_WSN_web_version.pdf”]
MIT’s Solve 2017 Problem Solving Global challenges
Solve has launched its new challenges for 2017, which is a good base for wireless sensor network practitioners, researchers and IoT experts to showcase why the future belongs to us. According to MIT President Rafael Reif at Solve at MIT…
Security in an IoT Open Platform
With the recent marriage of convenience between China Telecom and Ericsson in support of China’s “One Belt One Road” strategy and to further advancements in the deployment of Internet of Things solution and services, this editorial addresses the security associated…
Apple Abandons Finger Print Sensor
Reports from Bloomberg is that Apple’s Touch ID could be replace by a new 3D scanning system that uses face recognition to verify payments, log in to apps and unlock the upcoming iPhone 8. It is the drastic redesign expected…