2014
DOI: 10.12720/jcm.9.2.135-143
|View full text |Cite
|
Sign up to set email alerts
|

Study on Denial of Service against Underwater Acoustic Networks

Abstract: In ocean exploration and other maritime engineering, UAN (Underwater Acoustic Networks) is bound to play more important roles. Thinking of the serious environment UAN operates, safety and security must be guaranteed first. Among the possible attacks against UAN, DoS (Denial of Service) is a class of commonly-used methods. The basic procedures of different DoS attacks are analyzed and some of the DoS attacks against UAN are simulated to investigate their effects to lower the performances of UAN. Flooding, wormh… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 17 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…Also, they have put forth some analysis impact of various attacks in wired underwater sensor networks. Followed by them, an experimental approach done by Habib et al [10] provides a better analysis of the effects of active attacks in UWSN using OPNET simulator. As a useful measure, various security mechanisms are designed by various researchers.…”
Section: Related Workmentioning
confidence: 99%
“…Also, they have put forth some analysis impact of various attacks in wired underwater sensor networks. Followed by them, an experimental approach done by Habib et al [10] provides a better analysis of the effects of active attacks in UWSN using OPNET simulator. As a useful measure, various security mechanisms are designed by various researchers.…”
Section: Related Workmentioning
confidence: 99%
“…A logical removal of a compromised node should be [50] carried out by rekeying the whole network because of a possible leakage of the secret contained in compromised nodes [6]. However, this may not be sufficient because a compromised node can still jam the network, and a physical removal is essential.…”
Section: Challenges For Uwans Securitymentioning
confidence: 99%
“…Some features of UWANs also pose challenges to attackers and can be leveraged somewhat in security scheme designs. These features include spare node distribution, low heterogeneity of network nodes, well-planned network deployment with a pre-configuration of security measures [48]- [50], as summarized below.…”
Section: Challenges To Attackersmentioning
confidence: 99%
“…Habib et al [19] discussed the possible occurrence of a wormhole and a Sybil attack in UWSN and listed the security requirements. Dong et al [20] simulated and analyzed the effect of DoS attacks, such as flooding, wormhole, and selective forwarding of acoustic networks after slightly modifying the radio transceiver pipeline stage in an OPNET simulation modeler.…”
Section: Introductionmentioning
confidence: 99%