PPNA Paper Publication [PSTRM: Privacy-aware sociopsychological trust and reputation model for wireless sensor networks] from CoDe Lab

The high possibility of attack is greatly attributed to the broadcast nature of the communication medium in which the sensor nodes operate; this makes eavesdropping of messages possible on the network. This paper proposes a privacy-aware sociopsychological trust and reputation management (PSTRM) model. The paper presents a model that models …

Paper Publication [Brain Tumor Segmentation using SLIC Superpixels and Optimized Thresholding Algorithm] from CoDe Lab

This paper deals with the implementation of a simple algorithm for automatic brain tumor segmentation. Brain tumor is commonly diagnosed by Computer tomography and Magnetic Resonance Imaging in clinical treatment. The paper uses Simple Linear Iterative Clustering (SLIC) to segment brain images according to their spatial and color proximities. The …

SoTRMSim: Sociopsychological Trust and Reputation Models Simulator for Wireless Sensor Networks

SoTRMSim is a MATLAB based simulator for simulating Wireless Sensor Networks (WSN) utilised in computing sociopsychological trust and reputation models. You can also use it to build randomised network deployments for other WSN related research work. This is ideal for new researchers who want existing code to build on in …

2018 Research Internship Opportunities at CoDe LAB

Connected Devices (CoDe) Lab is inviting qualified applicants for summer internship opportunities in the lab. The major areas available this summer is wireless sensor network design and security, machine learning and imae processing. Details of the available project with accompanying requisite skills set can be found here. You can also …

IJCS Paper Publication: [The adoption of socio- and bio-inspired algorithms for trust models in wireless sensor networks: A survey] from CoDe Lab

The security of a wireless sensor network is greatly increased with increasing levels of trustworthiness of nodes on the network. There are a number of trust models proposed that use various trust evaluation methods. The paper categorises trust evaluation methods for wireless sensor networks into socio-inspired, bio-inspired, and analytical methods. …

Measuring Artificial Intelligence: the Turing Test

Can Machines Think? Alan Turing asked himself the same question over six decades ago in his famous article entitled “Computing machinery and intelligence” (1950). His answer was to come up with what is today known as the Turing test, although in his day he called it “The Imitation Game” – a name that’s now familiar …

Research Internship Opportunities @ CoDe Lab

Connected Devices (CoDe) Lab is inviting qualified applicants for summer internship opportunities in the lab. The major areas available this summer is wireless sensor network design and security, and biomedical signal processing. Details of the available project with accompanying requisite skills set can be found here. You can also click …

IET Paper Publication [Tamper-aware Authentication Framework for WSN] from CODE Lab

Paper Abstract Sensor nodes once deployed onto the field are mostly provided with little or no attention making them prone to physical attacks by adversaries. Various security frameworks have been proposed to mitigate tampering; others also ensure authentication of sensor nodes. Energy is a limited resource and as such, the …