2020
DOI: 10.1109/jiot.2020.2982613
|View full text |Cite
|
Sign up to set email alerts
|

A Game-Theoretic and Experimental Analysis of Energy-Depleting Underwater Jamming Attacks

Abstract: Security aspects in underwater wireless networks have not been widely investigated so far, despite the critical importance of the scenarios in which these networks can be employed. For example, an attack to a military underwater network for enemy targeting or identification can lead to serious consequences. Similarly, environmental monitoring applications such as tsunami prevention are also critical from a public safety point of view. In this work, we assess a scenario in which a malicious node tries to perfor… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(10 citation statements)
references
References 32 publications
0
7
0
Order By: Relevance
“…For most of the CFT consensus algorithms, more than half of the nodes need to survive to ensure a consensus [14], [15], [18]. However, due to inevitable natural damage, subsystem malfunction, limited lifespan, inadequate energy supplement and jammer attacks [22]- [24], the connected nodes are easy to crash. If more than half of the nodes are crashed, the consensus cannot be achieved.…”
Section: B Motivations and State Of The Artmentioning
confidence: 99%
“…For most of the CFT consensus algorithms, more than half of the nodes need to survive to ensure a consensus [14], [15], [18]. However, due to inevitable natural damage, subsystem malfunction, limited lifespan, inadequate energy supplement and jammer attacks [22]- [24], the connected nodes are easy to crash. If more than half of the nodes are crashed, the consensus cannot be achieved.…”
Section: B Motivations and State Of The Artmentioning
confidence: 99%
“…Recently, many studies have been conducted for the cooperative network using trusted relays to ameliorate the physical layer security [13]- [15]. There exist some efforts of designing the optimal strategy for anti-jamming communications [16]- [18]. The authors in [16] studied a dynamic channel allocation mechanism to deal with the spectrum conflicts and reduce the impacts of various jamming attacks.…”
Section: B Related Workmentioning
confidence: 99%
“…However, the wireless channels are simply modeled without considering the channel fading effect of wireless devices, leading to low feasibility of the proposed approaches. The spectrum assignment and routing scheme was developed to address jamming issues in a multi-hop scenario in [17], while the authors in [18] modeled the jamming attack using the game theory-based method to define the optimal strategies by assuming complete information of the adversary. Never-theless, these works, [16]- [18], did not consider the energy harvesting context.…”
Section: B Related Workmentioning
confidence: 99%
“…In the study of Signori et al [5], we consider an environment where jamming attacks, lowering the quality of communication of battery-powered submerged nodes, are performed by a harmful node. To increase the probabilities of correct delivery of the packet, packet-level coding is used in the legitimate transmitter.…”
Section: Introductionmentioning
confidence: 99%