IJCS Paper Publication: [The adoption of socio- and bio-inspired algorithms for trust models in wireless sensor networks: A survey] from CoDe Lab

The security of a wireless sensor network is greatly increased with increasing levels of trustworthiness of nodes on the network. There are a number of trust models proposed that use various trust evaluation methods. The paper categorises trust evaluation methods for wireless sensor networks into socio-inspired, bio-inspired, and analytical methods. …

Measuring Artificial Intelligence: the Turing Test

Can Machines Think? Alan Turing asked himself the same question over six decades ago in his famous article entitled “Computing machinery and intelligence” (1950). His answer was to come up with what is today known as the Turing test, although in his day he called it “The Imitation Game” – a name that’s now familiar …

IET Paper Publication [Tamper-aware Authentication Framework for WSN] from CODE Lab

Paper Abstract Sensor nodes once deployed onto the field are mostly provided with little or no attention making them prone to physical attacks by adversaries. Various security frameworks have been proposed to mitigate tampering; others also ensure authentication of sensor nodes. Energy is a limited resource and as such, the …

Securing the Internet of Things (IoT) with Blockchain

IoT is creating new opportunities and providing a competitive advantage for businesses in current and new markets. It touches everything—not just the data, but how, when, where and why you collect it. The technologies that have created the Internet of Things aren’t changing the internet only, but rather change the …