Security challenges of Internet of Underwater Things: A systematic literature review
暂无分享,去创建一个
Tooska Dargahi | Mohammad Hammoudeh | Sana Belguith | Aliyu Gana Yisa | Mohammad Hammoudeh | T. Dargahi | Sana Belguith
[1] Wang Jian,et al. Classification of DoS Attacks in Smart Underwater Wireless Sensor Network , 2019, Wireless Personal Communications.
[2] Manas Kumar Mishra,et al. Enhance the Lifespan of Underwater Sensor Network Through Energy Efficient Hybrid Data Communication Scheme , 2020, 2020 International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC).
[3] Iyad Dayoub,et al. A Comparative Study of Asynchronous and Synchronous OCDMA Systems , 2021, IEEE Systems Journal.
[4] Fazirulhisyam Hashim,et al. Normalized Advancement Based Totally Opportunistic Routing Algorithm With Void Detection and Avoiding Mechanism for Underwater Wireless Sensor Network , 2020, IEEE Access.
[5] Mari Carmen Domingo,et al. Securing underwater wireless communication networks , 2011, IEEE Wireless Communications.
[6] M. Shamim Kaiser,et al. Malicious attack detection in underwater wireless sensor network , 2015, 2015 IEEE International Conference on Telecommunications and Photonics (ICTP).
[7] Bharat K. Bhargava,et al. Visualisation of wormholes in underwater sensor networks : a distributed approach , 1993 .
[8] Sheetal Bagali,et al. Efficient Channel Access Model for Detecting Reactive Jamming for Underwater Wireless Sensor Network , 2019, 2019 International Conference on Wireless Communications Signal Processing and Networking (WiSPNET).
[9] Yonghua Zhu,et al. Modeling the Wormhole Attack in Underwater Sensor Network , 2012 .
[10] Arshad Iqbal,et al. Two hop verification for avoiding void hole in underwater wireless sensor network using SM‐AHH‐VBF and AVH‐AHH‐VBF routing protocols , 2020, Trans. Emerg. Telecommun. Technol..
[11] Tooska Dargahi,et al. Securing Underwater Sensor Networks Against Routing Attacks , 2017, Wirel. Pers. Commun..
[12] I. Srinivasa Rao,et al. Retraction Note to: Power Budget Analysis of an Ultra-Dense Coherent MB-OFDM WDM Metro-Access Networks , 2021, Wirel. Pers. Commun..
[13] Reza Ghazizadeh,et al. Gradient descent approach to secure localization for underwater wireless sensor networks , 2016, 2016 24th Iranian Conference on Electrical Engineering (ICEE).
[14] Anil Kumar Verma,et al. SAPDA: Secure Authentication with Protected Data Aggregation Scheme for Improving QoS in Scalable and Survivable UWSNs , 2020, Wireless Personal Communications.
[15] Haiyan Zhao,et al. Privacy preserving solution for the asynchronous localization of underwater sensor networks , 2020, IEEE/CAA Journal of Automatica Sinica.
[16] C. L. Philip Chen,et al. Underwater Internet of Things in Smart Ocean: System Architecture and Open Issues , 2020, IEEE Transactions on Industrial Informatics.
[17] Rajashri Khanai,et al. Localization, routing and its security in UWSN — A survey , 2016, 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT).
[18] Emad Felemban,et al. A Survey on Current Underwater Acoustic Sensor Network Applications , 2014 .
[19] M. Shamim Kaiser,et al. A novel algorithm for malicious attack detection in UWSN , 2015, 2015 International Conference on Electrical Engineering and Information Communication Technology (ICEEICT).
[20] Bharat K. Bhargava,et al. Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks , 2005, WiSe '05.
[21] Sabu M. Thampi,et al. Secure communication in mobile underwater wireless sensor networks , 2015, 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[22] Faisal Karim Shaikh,et al. Underwater Sensor Network Applications: A Comprehensive Survey , 2015, Int. J. Distributed Sens. Networks.
[23] Abderrazak Jemai,et al. A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis , 2020, Sensors.
[24] Kamal Kumar Gola,et al. Robust data aggregation, encryption and data transfer in UWSNs , 2015, 2015 1st International Conference on Next Generation Computing Technologies (NGCT).
[25] Sanguthevar Rajasekaran,et al. Data centric approach to analyzing security threats in Underwater Sensor Networks , 2016, OCEANS 2016 MTS/IEEE Monterey.
[26] Guangjie Han,et al. A Trust Cloud Model for Underwater Wireless Sensor Networks , 2017, IEEE Communications Magazine.
[27] Yuan Li,et al. Research challenges and applications for underwater sensor networking , 2006, IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006..
[28] Liang Xiao,et al. Jamming Games in Underwater Sensor Networks with Reinforcement Learning , 2014, GLOBECOM 2014.
[29] Dinesh K Anvekar,et al. Secure Localization for Underwater Wireless Sensor Networks Based on Probabilistic Approach , 2018, 2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC).
[30] Albert Levi,et al. Key distribution scheme for peer-to-peer communication in mobile underwater wireless sensor networks , 2014, Peer-to-Peer Netw. Appl..
[31] Mohammad Hammoudeh,et al. Analysis of attribute-based cryptographic techniques and their application to protect cloud services , 2019, Trans. Emerg. Telecommun. Technol..
[32] Sabu M. Thampi,et al. Fault-resilient localization for underwater sensor networks , 2017, Ad Hoc Networks.
[33] Wei Zhou,et al. Security in Underwater Sensor Network , 2010, 2010 International Conference on Communications and Mobile Computing.
[34] Guang Yang,et al. A secure and energy balanced clustering protocol for underwater wireless sensor networks , 2018, 2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC).
[35] Nadeem Javaid,et al. NADEEM: Neighbor node approaching distinct energy‐efficient mates for reliable data delivery in underwater WSNs , 2019, Trans. Emerg. Telecommun. Technol..
[36] Deying Li,et al. A Low Computational Complexity Authentication Scheme in Underwater Wireless Sensor Network , 2015, 2015 11th International Conference on Mobile Ad-hoc and Sensor Networks (MSN).
[37] Sheetal Bagali,et al. Maximize resource utilization based channel access model with presence of reactive jammer for underwater wireless sensor network , 2020 .
[38] Michael Zuba,et al. Launching denial-of-service jamming attacks in underwater sensor networks , 2011, WUWNet '11.
[39] Liang Xiao,et al. Spoofing detection games in underwater sensor networks , 2015, OCEANS 2015 - MTS/IEEE Washington.
[40] Athanasios V. Vasilakos,et al. Jamming in underwater sensor networks: detection and mitigation , 2012, IET Commun..
[41] Guang Yang,et al. Challenges and Security Issues in Underwater Wireless Sensor Networks , 2018, IIKI.
[42] Md. Mustafizur Rahman,et al. ANFIS based Trust Management Model to Enhance Location Privacy in Underwater Wireless Sensor Networks , 2019, 2019 International Conference on Electrical, Computer and Communication Engineering (ECCE).
[43] Ming Xu,et al. SenseVault: A Three-tier Framework for Securing Mobile Underwater Sensor Networks , 2018, IEEE Transactions on Mobile Computing.
[44] Yasser Zahedi,et al. A Survey of Existing Medium Access Control (MAC) for Underwater Wireless Sensor Network (UWSN) , 2010, 2010 Fourth Asia International Conference on Mathematical/Analytical Modelling and Computer Simulation.