2017
DOI: 10.1177/1550147717713643
|View full text |Cite
|
Sign up to set email alerts
|

A secure routing scheme for underwater acoustic networks

Abstract: Secure and anonymous routing is required in many underwater acoustic network applications such as marine military. However, the characteristics of underwater acoustic networks cause existing secure scheme designed for traditional terrestrial networks to be inapplicable. This article presents a secure routing design for underwater acoustic networks. First, considering the difficulty of setting a trusted third party in underwater acoustic networks, a short signature algorithm without any online trusted third par… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 18 publications
(16 citation statements)
references
References 15 publications
0
13
0
Order By: Relevance
“…The authors in [21] proposed a design of secure routing approach for UASNs. The researchers in this research proposed an efficient signature schemes with no need of the online trusted third party.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The authors in [21] proposed a design of secure routing approach for UASNs. The researchers in this research proposed an efficient signature schemes with no need of the online trusted third party.…”
Section: Literature Reviewmentioning
confidence: 99%
“…(see the survey article 27‐29 and the references therein for more details). There are few publications on secure routing in UWASNs 30 and, 31 which design routing protocols to detect a wormhole link in an UWASN. In Reference 30, Zhang and Zhang detect a wormhole link through a set of neighbor discovery protocols based on the direction of arrival of the acoustic wave.…”
Section: Related Work and Contributions Of This Workmentioning
confidence: 99%
“…In Reference 30, Zhang and Zhang detect a wormhole link through a set of neighbor discovery protocols based on the direction of arrival of the acoustic wave. A secure, anonymous routing protocol is presented in Reference 31 which performs two‐way signature‐based authentication under the assumption that the attacker node has no information (such as location, ID, and so on) about the legitimate nodes.…”
Section: Related Work and Contributions Of This Workmentioning
confidence: 99%
“…A secure and anonymous routing scheme [28] with short digital signature algorithm is proposed without any online trusted third party recommendation, which is used for authentication between source and destination. Then trapdoor scheme is proposed for routing messages.…”
Section: Prior Work On Security Schemesmentioning
confidence: 99%