2020
DOI: 10.14569/ijacsa.2020.0110708
|View full text |Cite
|
Sign up to set email alerts
|

Cluster based Detection and Reduction Techniques to Identify Wormhole Attacks in Underwater Wireless Sensor Networks

Abstract: Underwater Wireless Sensor Networks (UWSN) is widely used in variety of applications but none of the applications have taken network security into considerations. Deployment of underwater network is a challenging task and because of the hash underwater environment, the network is vulnerable to large class of security attacks. Recent research on underwater communication focuses mainly on energy efficiency, network connectivity and maximum communication range. The nature of underwater sensor network makes it mor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…However, the scheme does not consider the influence of an underwater acoustic channel on detection results. A detection technique for identifying underwater wormhole attacks is proposed in [ 17 ]. The round-trip time of a wormhole attack is shorter than that of normal links, which can be used to judge the existence of wormhole links.…”
Section: Related Workmentioning
confidence: 99%
“…However, the scheme does not consider the influence of an underwater acoustic channel on detection results. A detection technique for identifying underwater wormhole attacks is proposed in [ 17 ]. The round-trip time of a wormhole attack is shorter than that of normal links, which can be used to judge the existence of wormhole links.…”
Section: Related Workmentioning
confidence: 99%
“…Murgod et al [18] presented cluster based wormhole attacks detection and reduction technique in UWSNs environments. Energy Efficient Hybrid Optical-Acoustic Cluster Based Routing (EEHRC) Protocol was used to detect the presence of wormhole attack and prevent the UWSN from the attack.…”
Section: Classical Approachesmentioning
confidence: 99%