2019 International Conference on Wireless Communications Signal Processing and Networking (WiSPNET) 2019
DOI: 10.1109/wispnet45539.2019.9032861
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Channel Access Model for Detecting Reactive Jamming for Underwater Wireless Sensor Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 14 publications
(18 citation statements)
references
References 16 publications
0
16
0
Order By: Relevance
“…A large percentage of the primary studies are focused on addressing a particular threat or group of attacks, proposing new algorithms 17,37,46 and security models. 30,44,49 The other papers are focused on demonstration and classification of attacks and threats, such as DoS, localization and routing attacks, 26,27,32 as well as presenting security issues and key research challenges. 13,16,23 These studies are mostly evaluated using simulations.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…A large percentage of the primary studies are focused on addressing a particular threat or group of attacks, proposing new algorithms 17,37,46 and security models. 30,44,49 The other papers are focused on demonstration and classification of attacks and threats, such as DoS, localization and routing attacks, 26,27,32 as well as presenting security issues and key research challenges. 13,16,23 These studies are mostly evaluated using simulations.…”
Section: Discussionmentioning
confidence: 99%
“…• Jamming: a jamming attack is performed by injecting unwanted signals into the channel, thereby occupying the network channel and disrupting legitimate communications. 26,[29][30][31] Jamming attacks are especially dangerous to the network because no special hardware is required, the open communication medium can be interfered in order to make the attack smarter; also this attack can be executed with minimal cost. 26 In addition to sabotaging communications, jamming can degrade the overall lifetime of the network by depleting sensor node batteries.…”
Section: Security Attacksmentioning
confidence: 99%
“…This section present efficient resource allocation design for mitigating multi-jammer in UWSN. First this work adopts cross layer design presented in our previous work [26], [27]. Second discusses about the resource maximization problem with presence of multiple jammers in UWSN.…”
Section: Efficient Resource Allocation Designing For Underwater Wirelmentioning
confidence: 99%
“…Let assume a UWSN with trustworthy underwater motes where these motes can communicate with each other [26], [27]. Further there are orthogonal frequency channels using which the underwater motes will communicate among themselves.…”
Section: System Model Reactive Jamming and Cross Layer Design Modelmentioning
confidence: 99%
See 1 more Smart Citation