On modeling of eavesdropping behavior in underwater acoustic sensor networks
暂无分享,去创建一个
[1] Farooq Anjum,et al. Security for Wireless Ad Hoc Networks: Anjum/Ad hoc Networks , 2007 .
[2] Rodney F. W. Coates,et al. Underwater Acoustic Systems , 1990 .
[3] Mari Carmen Domingo,et al. Securing underwater wireless communication networks , 2011, IEEE Wireless Communications.
[4] Yonghua Zhu,et al. Modeling the Wormhole Attack in Underwater Sensor Network , 2012 .
[5] Wei-Ping Zhu,et al. Relay-Selection Improves the Security-Reliability Trade-Off in Cognitive Radio Systems , 2014, IEEE Transactions on Communications.
[6] Chiara Petrioli,et al. SecFUN: Security framework for underwater acoustic sensor networks , 2015, OCEANS 2015 - Genova.
[7] Milica Stojanovic,et al. On the relationship between capacity and distance in an underwater acoustic communication channel , 2007, MOCO.
[8] Xiao Lu,et al. Modeling the Wormhole Attack in Underwater Sensor Network , 2012, 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing.
[9] Aylin Yener,et al. MIMO Multiple Access Channel With an Arbitrarily Varying Eavesdropper: Secrecy Degrees of Freedom , 2013, IEEE Trans. Inf. Theory.
[10] Dario Pompili,et al. Underwater acoustic sensor networks: research challenges , 2005, Ad Hoc Networks.
[11] Hao Wang,et al. On Modeling Eavesdropping Attacks in Underwater Acoustic Sensor Networks † , 2016, Sensors.