Security Challenges, Solutions and Enhanced Security Techniques for Wireless Sensor Network [gview file=”http://www.wsnmagazine.com/security challenges.pdf” save=”0″]
Category: Technical Articles
Technical papers written in the field of wireless sensor networks
Socio-Technological Factors Affecting User’s Adoption of eHealth Functionalities: A Case Study of China and Ukraine eHealth Systems
A group of researchers has published a finding that analyzes user attitudes to eHealth applications in China and eHealth system in Ukraine used to provide insights and suggestions to the development of an eHealth application (eZdorovya) for health information services…
NewTek Introduces New Tested and Approved Radiation Resistant LVDT Position Sensors for Applications with Radiation Exposure
NewTek Sensors, a company incorporated in 2016, that offers more than 200 years of cumulative LVDT design and manufacturing experience introduces a new line of Radiation Resistant LVDTs that provide critical position measurements in autoclaves, particle accelerators, nuclear power plants,…
Google is designing an advanced hand gesture recognition sensor.
MIT researchers developed a novel cryptography circuit for IoT devices
In a new study by MIT researchers presented at the recent International Solid-State Circuits Conference involves a novel cryptography circuit that can be used to protect low-power “internet of things” (IoT) devices in the coming age of quantum computing. The…
First African Rural Satellite Launch
OneWeb, a global communications company with a mission to bring connectivity to everyone, everywhere, has announced the successful launch of its first six broadband satellites aboard a Soyuz launch vehicle from the Guiana Space Center in Kourou, French Guiana. The…
Machine Learning with MATLAB: WSN Approach
Machine Learning has become a method of analyzing data that automates analytical model building. It is a branch of artificial intelligence that is based on the idea that systems can learn from data, identify patterns and make decisions with minimal human…
A bio-inspired spider monkey technique for detection of Sybil Attack in Large-Scale VANETs
Spider-Monkey Technique has been used by some researchers to detect Sybil attacks in Large Scale VANETS. According to the researchers, Celestine Iwendi ; Mueen Uddin ; James A. Ansere ; P. Nkurunziza ; J. H. Anajemba ; Ali Kashif Bashir “Vehicles attacked by malicious nodes usually cause time synchronization error…
Japanese tree frogs demonstrate Multi-hop communication in wireless sensor networks
Balancing Usability and Cybersecurity in IoT Devices
[gview file=”http://www.wsnmagazine.com/wp-content/uploads/2018/04/sdmwebinarapril24.pdf”] About the Presentation The Internet of Things (IoT) is growing fast, with web-enabled devices now helping people to monitor their health, upgrade their cars, and control home heating—remotely. Yet, these advances come with increasing security risks. The technology…