2020
DOI: 10.11591/ijece.v10i3.pp3284-3294
|View full text |Cite
|
Sign up to set email alerts
|

Maximize resource utilization based channel access model with presence of reactive jammer for underwater wireless sensor network

Abstract: Underwater sensor networks (UWSNs) are vulnerable to jamming attacks. Especially, reactive jamming which emerged as a greatest security threat to UWSNs. Reactive jammer are difficult to be removed, defended and identified. Since reactive jammer can control and regulate (i.e., the duration of the jam signal) the probability of jamming for maintaining high vulnerability with low detection probability. The existing model are generally designed considering terrestrial wireless sensor networks (TWSNs). Further, the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(12 citation statements)
references
References 22 publications
(28 reference statements)
0
12
0
Order By: Relevance
“…A large percentage of the primary studies are focused on addressing a particular threat or group of attacks, proposing new algorithms 17,37,46 and security models. 30,44,49 The other papers are focused on demonstration and classification of attacks and threats, such as DoS, localization and routing attacks, 26,27,32 as well as presenting security issues and key research challenges. 13,16,23 These studies are mostly evaluated using simulations.…”
Section: Discussionmentioning
confidence: 99%
“…A large percentage of the primary studies are focused on addressing a particular threat or group of attacks, proposing new algorithms 17,37,46 and security models. 30,44,49 The other papers are focused on demonstration and classification of attacks and threats, such as DoS, localization and routing attacks, 26,27,32 as well as presenting security issues and key research challenges. 13,16,23 These studies are mostly evaluated using simulations.…”
Section: Discussionmentioning
confidence: 99%
“…The successful resource allocation design for mitigating multi-jammers in UWSN is discussed in this section. First, the cross-layer architecture introduced in our previous work [22], [23] is adopted by this work. Secondly, the existence of several jammers in UWSN addresses the issue of resource maximization.…”
Section: Efficient Resource Allocation Designing For Underwater Wirel...mentioning
confidence: 99%
“…This section present efficient resource allocation design for mitigating multi-jammer in UWSN. First this work adopts cross layer design presented in our previous work [26], [27]. Second discusses about the resource maximization problem with presence of multiple jammers in UWSN.…”
Section: Efficient Resource Allocation Designing For Underwater Wirelmentioning
confidence: 99%
“…Let assume a UWSN with trustworthy underwater motes where these motes can communicate with each other [26], [27]. Further there are orthogonal frequency channels using which the underwater motes will communicate among themselves.…”
Section: System Model Reactive Jamming and Cross Layer Design Modelmentioning
confidence: 99%
See 1 more Smart Citation