Category: Technical Articles

Technical papers written in the field of wireless sensor networks

Sniffer WSN Gets Boost From Microchip Creation

Pair of engineers at California Institute of Technology (Caltech) has created a Tiny; inexpensive silicon microchips that generate and radiate high-frequency electromagnetic waves. This imager can penetrate a host of materials without the ionizing damaging effect of x-rays. The chips…

Step-by-Step: Writing Contiki Programs

Hands –on simple instructions on how to program WSN motes on the Contiki operating system platform is illustrated here. This is one of the experiences I had while attending the CONET summer school of 2011 with the developers of Contiki.…

AES Implementation on MicaZ with Contiki OS

Advanced Encryption Standard has been used to double the security of the MicaZ wireless sensor network nodes by the Wireless Sensor Network research group at the University of Aberdeen. We can recall that it was in the year 2001 that…

Wireless Sensor Networks with Contiki

The designers of operating systems for sensor nodes are often faced with the challenge of finding the right abstractions and lightweight mechanisms that offer a rich enough execution environment, while remaining within the system’s strict resource limitations. My hunt for…

Hot Research Areas in Wireless Sensor Networks

Are you thinking of a new direction for your research groups or something to add or expand what you are currently doing? We have got some things for you to ponder about. Unmanned Autonomous Aerial Vehicle Technologies Using WSN Experimental…

Java 7 Security Manager Bypass Vulnerability

The United States Computer Emergency Readiness Team (US-CERT) has issued a warning that hackers have figured out how to exploit Java vulnerabilities to install malicious software enabling them to commit crimes ranging from identity theft to making an infected computer…

Security Challenges for Wireless Sensor Networks

Wireless Sensor Systems deployments are security sensitive and attacks against them may lead to damage to health and safety of people. The biggest treat to WSS is Denial-of-service attack. These attacks are conditions for hardware failures, resource exhaustion, bugs, malicious…