2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC) 2018
DOI: 10.1109/spac46244.2018.8965617
|View full text |Cite
|
Sign up to set email alerts
|

A secure and energy balanced clustering protocol for underwater wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(7 citation statements)
references
References 23 publications
0
7
0
Order By: Relevance
“…In order to ensure the security of UWSNs, ref. [ 10 ] proposed a security clustering protocol based on a weighted algorithm to calculate trust value. Only the direct trust value is considered in this protocol to avoid the extra communication energy consumption caused by transmitting the indirect trust value.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…In order to ensure the security of UWSNs, ref. [ 10 ] proposed a security clustering protocol based on a weighted algorithm to calculate trust value. Only the direct trust value is considered in this protocol to avoid the extra communication energy consumption caused by transmitting the indirect trust value.…”
Section: Related Workmentioning
confidence: 99%
“…Although many trust model-based IDS for UWSN security have been proposed, there are still some limitations. Based on the weighted algorithm in [ 8 , 10 ], the determination of experience weight and trust threshold is subjective and will produce inaccurate results. The authors in [ 9 ] avoid the addition of trust measure and subjective weight, reduce the error of trust calculation, and effectively improve the detection accuracy of the defective nodes.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In [27], Robert et al proposed a novel clustering algorithm called the murmuration inspired clustering algorithm, which can improve the network lifetime by reducing the unnecessary overhead. In [28], Yang et al designed a clustering protocol to enhance the security of the UWA-SN. The above literatures mainly focus on the non-cooperative underwater acoustic sensor network, and have ignored the motion of the underwater sensor node caused by the ocean current in practice.…”
Section: Related Workmentioning
confidence: 99%
“…They conclude on three main challenges to trust management: the underwater environment and the acoustic communication channel, node mobility, and sparse node deployment. Yang et al 43 discuss constraints and challenges in UWSN, and study trust management. The authors propose a secure and energy balanced protocol based on an adaptive algorithm to prolong network lifetime and improve security.…”
Section: Attack Detection and Mitigationmentioning
confidence: 99%