2015
DOI: 10.1155/2015/325474
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Secure Medium Access Control Protocol for Cluster-Based Underwater Wireless Sensor Networks

Abstract: The unique characteristics of high bit error rate, low bandwidth, and long propagation delay in underwater environments pose significant challenges to the design of the medium access control (MAC) protocol for underwater wireless sensor networks (UWSNs). Clustering is an effective and practical way to enhance the performance of UWSNs. In this paper, we propose a secure MAC protocol for cluster-based UWSNs, called SC-MAC, which aims to ensure the security of data transmission. In SC-MAC, the clusters are formed… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(18 citation statements)
references
References 36 publications
0
18
0
Order By: Relevance
“…In [ 28 ], an underwater media access control protocol based on the RTS/CTS mechanism with a cipher block chaining-message authentication code is proposed to provide data confidentiality, authenticity, and replay attack protection. In [ 29 ], a secure MAC protocol for cluster-based UWSNs is proposed to ensure the security of data transmission. A random nonce is used to prevent a replay attack, which is updated each time after the message was transmitted.…”
Section: Threats and Challenges In Underwater Wireless Sensor Netwmentioning
confidence: 99%
“…In [ 28 ], an underwater media access control protocol based on the RTS/CTS mechanism with a cipher block chaining-message authentication code is proposed to provide data confidentiality, authenticity, and replay attack protection. In [ 29 ], a secure MAC protocol for cluster-based UWSNs is proposed to ensure the security of data transmission. A random nonce is used to prevent a replay attack, which is updated each time after the message was transmitted.…”
Section: Threats and Challenges In Underwater Wireless Sensor Netwmentioning
confidence: 99%
“…A secure transport protocol for WSN is proposed in [24], which employs an authentication mechanism to avoid the processing of fake control messages. A security defense mechanism in the MAC-layer is proposed in [25]. Overall, there are many works that have been proposed addressing security defenses in wireless sensor networks [26] and many of them may influence security protection in wireless multimedia sensor networks.…”
Section: Security Defensesmentioning
confidence: 99%
“…Secure protocols for data transmission and key management are desired for many scenarios, and security mechanisms for routing have also been proposed [23,88]. Moreover, some works have proposed secure protocols in the Transport [24] and MAC [25] layers. At last, integrated mechanisms for protection from different attacks, such as DoS [20], are also desired.…”
Section: Research Directionsmentioning
confidence: 99%
“…In [17] Xu et al proposed a secure MAC protocol for cluster-based UWSNs, called SC-MAC, which aims to ensure the security of data transmission. In SC-MAC, the clusters are formed and updated dynamically and securely.…”
Section: Related Workmentioning
confidence: 99%