Paper Publication [SoTRMSim: Sociopsychological Trust and Reputation Models Simulator for Wireless Sensor Networks]

The use of trust and reputation models (TRMs) are on the rise due to the increasing complexities of cryptography. The use of cryp- tography though potent on traditional networks, cannot be sup- ported by the resource constraint wireless sensor network (WSN). Trust evaluations have made use of a number of …

Paper Publication [Brain Tumor Segmentation using SLIC Superpixels and Optimized Thresholding Algorithm]

This paper deals with the implementation of a simple algorithm for automatic brain tumor segmentation. Brain tumor is commonly diagnosed by Computer tomography and Magnetic Resonance Imaging in clinical treatment. The paper uses Simple Linear Iterative Clustering (SLIC) to segment brain images according to their spatial and color proximities. The …

IJCS Paper Publication: [The adoption of socio- and bio-inspired algorithms for trust models in wireless sensor networks: A survey] from CODE Lab

Abstract The security of a wireless sensor network is greatly increased with increasing levels of trustworthiness of nodes on the network. There are a number of trust models proposed that use various trust evaluation methods. The paper categorises trust evaluation methods for wireless sensor networks into socio-inspired, bio-inspired, and analytical …

IET-WSS Paper Publication [Tamper-aware Authentication Framework for WSN] from CODE Lab

Paper Abstract Sensor nodes once deployed onto the field are mostly provided with little or no attention making them prone to physical attacks by adversaries. Various security frameworks have been proposed to mitigate tampering; others also ensure authentication of sensor nodes. Energy is a limited resource and as such, the …