About the presentation Although, attenuation in Electromagnetic (EM) wave propagation underwater is high at high frequencies, the theory predicts that propagation is possible at some useful distance in the lower Industrial, Scientific and Medical (ISM) band.The aim of this paper…
Connect or Die: Can M2M save the world?
About the presentation Iain will explore some Machine 2 Machine (M2M) applications which could help improve quality of life as well as saving time, energy and money. “Networks” will be key to making it happen, in more ways than you…
Enhanced Security Technique For WSN Nodes
Enhanced Security Technique For Wireless Sensor Network Nodes Wireless sensor network (WSN) have become a complete solution in making use of low power implementation and embedded systems. Many different security protocols have been proposed that allow some form of security…
Efficient System And Localisation of Faulty Nodes
This gallery contains 1 photo →
Wireless Sensor Networks: Technology and Applications
Wireless sensor network encompasses the characteristics of authentication, privacy, integrity, non-repudiation, and anti-play back. The greater the dependency of information sent or received in the network, the greater the security risks. Various security issues have been considered in ad hoc…
Internet Of Things: The Bridge To Delay Tolerant Networks
The term Internet of Things was first used by Kevin Ashton in 1999. The concept of the Internet of Things first became popular through the Auto-ID Center and related market analysts publications. Radio-frequency identification (RFID) is often seen as a…