Bharamagoudra et al., 2017 - Google Patents
Agent‐based secure routing for underwater acoustic sensor networksBharamagoudra et al., 2017
- Document ID
- 10975180058705399888
- Author
- Bharamagoudra M
- Manvi S
- Publication year
- Publication venue
- International Journal of Communication Systems
External Links
Snippet
The underwater networks have severe security implications and are vulnerable to various types of attacks such as selective forwarding, wormhole, and sinkhole. Neighbor discovery, a fundamental requirement for routing is vulnerable to wormhole attack, which enables false …
- 238000005265 energy consumption 0 abstract description 17
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Jiang | On securing underwater acoustic networks: A survey | |
Kavitha et al. | Security vulnerabilities in wireless sensor networks: A survey | |
Boukerche et al. | Secure localization algorithms for wireless sensor networks | |
Lal et al. | Toward the development of secure underwater acoustic networks | |
Poovendran et al. | A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks | |
Chen et al. | Sensor network security: a survey | |
El Defrawy et al. | Privacy-preserving location-based on-demand routing in MANETs | |
Furqan et al. | Wireless communication, sensing, and REM: A security perspective | |
Ahmad et al. | Analysis of security attacks and taxonomy in underwater wireless sensor networks | |
Lal et al. | Secure underwater acoustic networks: Current and future research directions | |
Bharamagoudra et al. | Agent‐based secure routing for underwater acoustic sensor networks | |
Radmand et al. | Taxonomy of wireless sensor network cyber security attacks in the oil and gas industries | |
Ioulianou et al. | Battery drain denial-of-service attacks and defenses in the Internet of Things | |
Fatema et al. | Attacks and counterattacks on wireless sensor networks | |
Alshambri et al. | Cybersecurity attacks on wireless sensor networks in smart cities: an exposition | |
Sen | A survey on security and privacy protocols for cognitive wireless sensor networks | |
Al Guqhaiman et al. | Lightweight multi-factor authentication for underwater wireless sensor networks | |
Zukarnain et al. | A survey of Sybil attack countermeasures in underwater sensor and acoustic networks | |
Zala et al. | Mitigating blackhole attack of underwater sensor networks | |
Anithaashri et al. | Security enhancement for wireless network communication | |
Oztoprak et al. | Security challenges, mitigation strategies, and future trends in wireless sensor networks: A review | |
Habib | Sensor network security issues at network layer | |
Haque et al. | Security attacks and countermeasures in wireless sensor networks | |
Singh et al. | A survey on wireless sensor network security and its countermeasures: an overview | |
Haas et al. | Current challenges and approaches in securing communications for sensors and actuators |