Saugata Bose

Learn More
Sensor nodes deployed in hostile environments are vulnerable to capture and compromise. Due to the inexpensive hardware components, an attacker can easily obtain cryptographic information from these sensors, clone them and surreptitiously insert these clones back in the network. Cloning provides the adversary an easy way to build an army of malicious nodes(More)
Among various models, now a day, to address changing customer's needs, commercial software developers intend to use iterative processes. Agile software development processes are built on the foundation of iterative development. One of the agile development processes is Scrum, which is an iterative incremental process of software development. Besides meeting(More)
  • 1