2015
DOI: 10.17706/ijcee.2015.7.5.325-334
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of Neighbor Discovery Protocol for Underwater Acoustic Communications

Abstract: Underwater Acoustic Sensor Networks (UASN) consisting of sensor nodes and underwater gateways (routers) have wide variety of applications, which include environmental monitoring, scientific exploration, surveillance etc. Ad hoc nature of these networks in terms of mobility due to water current pose challenges in topology management. Neighbor discovery is an important issue in topology management which is required to auto configure the node addresses, and establish communication links among the nodes to perform… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2017
2017

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 19 publications
(17 reference statements)
0
1
0
Order By: Relevance
“…The neighbor nodes on receiving RRQ verifies whether the information is from the legitimate node through the authentication mechanism, and once it is able to access the information through the key, it checks for condition given in . The various parameters of the node such as link quality (L qual ), queue length (N queue ), node energy (N energy ), and hop count information (C hop ) are obtained as in previous studies, 36,48 and if the neighbor node is legitimate it sets the field of true neighbor TN field to 1; other fields ID, SA, DA, RI, and RDF are similar to the RRQ. The packet is sent by encrypting using AES encryption with the key.…”
Section: Routing Modulementioning
confidence: 99%
“…The neighbor nodes on receiving RRQ verifies whether the information is from the legitimate node through the authentication mechanism, and once it is able to access the information through the key, it checks for condition given in . The various parameters of the node such as link quality (L qual ), queue length (N queue ), node energy (N energy ), and hop count information (C hop ) are obtained as in previous studies, 36,48 and if the neighbor node is legitimate it sets the field of true neighbor TN field to 1; other fields ID, SA, DA, RI, and RDF are similar to the RRQ. The packet is sent by encrypting using AES encryption with the key.…”
Section: Routing Modulementioning
confidence: 99%