2022
DOI: 10.1109/jiot.2022.3176374
|View full text |Cite
|
Sign up to set email alerts
|

Channel-Based Trust Model for Security in Underwater Acoustic Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 41 publications
0
5
0
Order By: Relevance
“…Several types of internal attacks in UASNs, such as wormhole, sinkhole, and selective forwarding, were individually addressed in [59], [60], [61], and [62], respectively. Recently, reputation-based trust models were proposed as effective tools for simultaneously dealing with a wide range of internal attacks in UASNs [6], [63]- [65]. A trust mechanism can be applied when correct node behavior and misbehavior are defined precisely and can be detected.…”
Section: B Mitigating Internal Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…Several types of internal attacks in UASNs, such as wormhole, sinkhole, and selective forwarding, were individually addressed in [59], [60], [61], and [62], respectively. Recently, reputation-based trust models were proposed as effective tools for simultaneously dealing with a wide range of internal attacks in UASNs [6], [63]- [65]. A trust mechanism can be applied when correct node behavior and misbehavior are defined precisely and can be detected.…”
Section: B Mitigating Internal Attacksmentioning
confidence: 99%
“…Standard countermeasures against replay attacks, like packet time-stamping, fall short in UASNs due to constraints on packet header size and the need to limit communication overhead in low data-rate conditions. Moreover, timestamp-based strategies risk the unintended loss of legitimate packets due to the significant Packet Delivery Delays (PDD), which can extend up to several minutes [6]. Adding to this complexity is GPS unavailability for network synchronization, making the use of timestamps both challenging and costly.…”
Section: Introductionmentioning
confidence: 99%
“…Nevertheless, the article presents examples of impulse responses from measurements in static conditions, encouraging, at the same time, to conduct the research in motion. The article [17] shows the impact of daily changes on the quality of transmission. Given the disruptive nature of the acoustic channel, where an acoustic link between two nodes may present only a small packet loss for several hours, later, for a few hours, the link presents a high packet loss and then returns to stability again.…”
Section: Introductionmentioning
confidence: 99%
“…Signori et al [22] designed an effective approach that implements a reputation system. In the system, the node accumulates trust through good behavior and loses trust when exhibiting suspicious behavior.…”
mentioning
confidence: 99%
“…The marine assets employed in this project, both underwater and above water, require information exchange to facilitate the RoboVaaS services. For underwater data transfer, acoustic communication systems benefit from the maturity achieved in acoustic transmission and signal processing techniques [22]. Recently developed acoustic low-power sensor nodes [19] have been utilized, and the data gathered by these sensors have been gathered by a newly designed Autonomous Surface Vehicle (ASV).…”
mentioning
confidence: 99%