Nothing Special   »   [go: up one dir, main page]

Bharamagoudra et al., 2017 - Google Patents

Agent‐based secure routing for underwater acoustic sensor networks

Bharamagoudra et al., 2017

Document ID
10975180058705399888
Author
Bharamagoudra M
Manvi S
Publication year
Publication venue
International Journal of Communication Systems

External Links

Snippet

The underwater networks have severe security implications and are vulnerable to various types of attacks such as selective forwarding, wormhole, and sinkhole. Neighbor discovery, a fundamental requirement for routing is vulnerable to wormhole attack, which enables false …
Continue reading at onlinelibrary.wiley.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organizing networks, e.g. ad-hoc networks or sensor networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures

Similar Documents

Publication Publication Date Title
Jiang On securing underwater acoustic networks: A survey
Kavitha et al. Security vulnerabilities in wireless sensor networks: A survey
Boukerche et al. Secure localization algorithms for wireless sensor networks
Lal et al. Toward the development of secure underwater acoustic networks
Poovendran et al. A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
Chen et al. Sensor network security: a survey
El Defrawy et al. Privacy-preserving location-based on-demand routing in MANETs
Furqan et al. Wireless communication, sensing, and REM: A security perspective
Ahmad et al. Analysis of security attacks and taxonomy in underwater wireless sensor networks
Lal et al. Secure underwater acoustic networks: Current and future research directions
Bharamagoudra et al. Agent‐based secure routing for underwater acoustic sensor networks
Radmand et al. Taxonomy of wireless sensor network cyber security attacks in the oil and gas industries
Ioulianou et al. Battery drain denial-of-service attacks and defenses in the Internet of Things
Fatema et al. Attacks and counterattacks on wireless sensor networks
Alshambri et al. Cybersecurity attacks on wireless sensor networks in smart cities: an exposition
Sen A survey on security and privacy protocols for cognitive wireless sensor networks
Al Guqhaiman et al. Lightweight multi-factor authentication for underwater wireless sensor networks
Zukarnain et al. A survey of Sybil attack countermeasures in underwater sensor and acoustic networks
Zala et al. Mitigating blackhole attack of underwater sensor networks
Anithaashri et al. Security enhancement for wireless network communication
Oztoprak et al. Security challenges, mitigation strategies, and future trends in wireless sensor networks: A review
Habib Sensor network security issues at network layer
Haque et al. Security attacks and countermeasures in wireless sensor networks
Singh et al. A survey on wireless sensor network security and its countermeasures: an overview
Haas et al. Current challenges and approaches in securing communications for sensors and actuators