2017
DOI: 10.3390/s17051168
|View full text |Cite
|
Sign up to set email alerts
|

Virtual-Lattice Based Intrusion Detection Algorithm over Actuator-Assisted Underwater Wireless Sensor Networks

Abstract: Due to the lack of a physical line of defense, intrusion detection becomes one of the key issues in applications of underwater wireless sensor networks (UWSNs), especially when the confidentiality has prime importance. However, the resource-constrained property of UWSNs such as sparse deployment and energy constraint makes intrusion detection a challenging issue. This paper considers a virtual-lattice-based approach to the intrusion detection problem in UWSNs. Different from most existing works, the UWSNs cons… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 31 publications
0
8
0
Order By: Relevance
“…According to VAS and equation (7) combining with Fig. 11, we can obtain the coordinate (x N , y N ) of underwater unlocated node at point N. However, a problem existed here is that the distance of d B2 N is unknown, and the original coordinates of N points cannot be obtained normally through VAS, so d B2 N must be found.…”
Section: ) Underwater Unlocated Nodes Location Calculation In Movingmentioning
confidence: 99%
See 1 more Smart Citation
“…According to VAS and equation (7) combining with Fig. 11, we can obtain the coordinate (x N , y N ) of underwater unlocated node at point N. However, a problem existed here is that the distance of d B2 N is unknown, and the original coordinates of N points cannot be obtained normally through VAS, so d B2 N must be found.…”
Section: ) Underwater Unlocated Nodes Location Calculation In Movingmentioning
confidence: 99%
“…Underwater Acoustic Sensor Networks (UASNs) have attracted many attentions due to their important applications in multiple fields such as environmental monitoring, offshore exploration, disaster prevention, and military surveillance [1]- [3]. In UASNs, node localization is one of the hot research areas, because it plays an important supporting role in many processes such as node recovery, topology control, routing decision [4], [5], application monitoring [6], [7] etc.…”
Section: Introductionmentioning
confidence: 99%
“…Please note that Euler-Lagrange systems have significant advantages in modelling the dynamical processing for industrial applications, such as [ 14 , 15 , 16 , 17 , 18 , 19 ]. However, it is non-trivial to apply the linear system-based results to control the Euler-Lagrange systems.…”
Section: Introductionmentioning
confidence: 99%
“…How to identify various network attacks is a key technology that needs to be solved [9,10]. The security studies of wireless sensor networks mainly focuses on the following aspects: (1) various network attack models and defense strategies; (2) encryption algorithms, key management, and authentication technology; (3) network routing and the security of data fusion; and (4) network intrusion detection systems and response models [11,12]. The security studies of wireless sensor networks can be divided into passive defense and active defense.…”
Section: Introductionmentioning
confidence: 99%