Visible to the public Biblio

Filters: Keyword is Underwater wireless sensor network  [Clear All Filters]
2023-08-04
Bian, Yuan, Lin, Haitao, Song, Yuecai.  2022.  Game model of attack and defense for underwater wireless sensor networks. 2022 IEEE 10th Joint International Information Technology and Artificial Intelligence Conference (ITAIC). 10:559–563.
At present, the research on the network security problem of underwater wireless sensors is still few, and since the underwater environment is exposed, passive security defense technology is not enough to deal with unknown security threats. Aiming at this problem, this paper proposes an offensive and defensive game model from the finite rationality of the network attack and defense sides, combined with evolutionary game theory. The replicated dynamic equation is introduced to analyze the evolution trend of strategies under different circumstances, and the selection algorithm of optimal strategy is designed, which verifies the effectiveness of this model through simulation and provides guidance for active defense technology.
ISSN: 2693-2865
2022-03-23
Zala, Dhruvi, Thummar, Dhaval, Chandavarkar, B. R..  2021.  Mitigating Blackhole attack of Underwater Sensor Networks. 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT). :1—8.
Underwater wireless sensor network(UWSN) is an emerging technology for exploring and research inside the ocean. Since it is somehow similar to the normal wireless network, which uses radio signals for communication purposes, while UWSN uses acoustic for communication between nodes inside the ocean and sink nodes. Due to unattended areas and the vulnerability of acoustic medium, UWNS are more prone to various malicious attacks like Sybil attack, Black-hole attack, Wormhole attack, etc. This paper analyzes blackhole attacks in UWSN and proposes an algorithm to mitigate blackhole attacks by forming clusters of nodes and selecting coordinator nodes from each cluster to identify the presence of blackholes in its cluster. We used public-key cryptography and the challenge-response method to authenticate and verify nodes.