2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT) 2020
DOI: 10.1109/icccnt49239.2020.9225431
|View full text |Cite
|
Sign up to set email alerts
|

Mitigating Localization and Neighbour Spoofing Attacks in Underwater Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…Chandavarkar and Gadagkar 116 devised an anti‐Spoof (a‐Spoof) method to minimize localization and neighbor spoofing threats in UASN. To share the location, A‐Spoof employs three symmetric passwords that are pre‐shared.…”
Section: Uwsns—attacksmentioning
confidence: 99%
“…Chandavarkar and Gadagkar 116 devised an anti‐Spoof (a‐Spoof) method to minimize localization and neighbor spoofing threats in UASN. To share the location, A‐Spoof employs three symmetric passwords that are pre‐shared.…”
Section: Uwsns—attacksmentioning
confidence: 99%
“…After being captured, the malicious anchor nodes underwater may exhibit two types of behaviors: direct and indirect malicious behavior. Direct malicious behavior [18] includes providing false location information and advancing or delaying sending response messages. The indirect malicious behavior [17] affects the normal operation of the network by deliberately lowering the trust value of normal anchor nodes or increasing the trust value of underwater malicious anchor nodes, that is, the trust deception behavior.…”
Section: Introductionmentioning
confidence: 99%
“…On this basis, it further proposed an authentication scheme using deep reinforcement learning to improve the accuracy of spoofing detection. Literature [8] proposes an a-spoof algorithm based on a shared key mechanism and a hash algorithm for attacks caused by nodes exchanging location and identity information.…”
Section: Introductionmentioning
confidence: 99%