Proceedings of the 10th International Conference on Underwater Networks &Amp; Systems - WUWNET '15 2015
DOI: 10.1145/2831296.2831320
|View full text |Cite
|
Sign up to set email alerts
|

An Experimental Study of Jamming Attacks in Underwater Acoustic Communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…• Base Station to Cloud: To analyze the critical synchronization of the ground-based sensor nodes with TBSSP keys paired on the cloud server. The proposed approach usually provides dynamic and reliable communication transformation [8]. Since the whole network utilizes keys to secure data transmissions, this application method is similar to a private master key mechanism.…”
Section: The Methods Of Unwavering Data Channelingmentioning
confidence: 99%
“…• Base Station to Cloud: To analyze the critical synchronization of the ground-based sensor nodes with TBSSP keys paired on the cloud server. The proposed approach usually provides dynamic and reliable communication transformation [8]. Since the whole network utilizes keys to secure data transmissions, this application method is similar to a private master key mechanism.…”
Section: The Methods Of Unwavering Data Channelingmentioning
confidence: 99%
“…In Su et al (2022) and Xiao et al (2015), collaborative jamming as a countermeasure to security threats is considered as well.…”
Section: Related Workmentioning
confidence: 99%