Analysis of Security and Threat of Underwater Wireless Sensor Network Topology

被引:5
|
作者
Yang, Guang [1 ]
Wei, Zhiqiang [1 ]
Cong, Yanping [1 ]
Jia, Dongning [1 ]
机构
[1] Ocean Univ China, Qingdao 266100, Peoples R China
关键词
underwater wireless sensor networks; network topology; U-CBSS; security;
D O I
10.1117/12.968205
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Underwater wireless sensor networks (UWSNs) are a subclass of wireless sensor networks. Underwater sensor deployment is a significant challenge due to the characteristics of UWSNs and underwater environment. Recent researches for UWSNs deployment mostly focus on the maintenance of network connectivity and maximum communication coverage. However, the broadcast nature of the transmission medium incurs various types of security attacks. This paper studies the security issues and threats of UWSNs topology. Based on the cluster-based topology, an underwater cluster-based security scheme (U-CBSS) is presented to defend against these attacks. and safety.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] Topology Structure Design for Underwater Acoustic Wireless Sensor Network
    Guan, Jing
    Huang, Jianguo
    Lu, Jun
    Wang, Jing
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE OF IEEE REGION 10 (TENCON), 2013,
  • [2] Underwater Wireless Sensor Network
    Faugstadmo, Jan Erik
    Pettersen, Magne
    Hovem, Jens M.
    Lie, Arne
    Reinen, Tor Arne
    [J]. 2010 FOURTH INTERNATIONAL CONFERENCE ON SENSOR TECHNOLOGIES AND APPLICATIONS (SENSORCOMM), 2008, : 422 - 427
  • [3] Analysis of Security Attacks and Taxonomy in Underwater Wireless Sensor Networks
    Ahmad, Irfan
    Rahman, Taj
    Zeb, Asim
    Khan, Inayat
    Ullah, Inam
    Hamam, Habib
    Cheikhrouhou, Omar
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [4] Topology of mobile underwater wireless sensor networks
    [J]. He, M. (review_paper@126.com), 1761, Northeast University (28):
  • [5] Application of Primary Components Analysis of Security Threat in Wireless Network
    Qu Zhiming
    Wang Jingmei
    [J]. 2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL IV, 2009, : 234 - +
  • [6] Security Threat Analysis and Countermeasures on Consensus-Based Time Synchronization Algorithms for Wireless Sensor Network
    Jha S.K.
    Gupta A.
    Panigrahi N.
    [J]. SN Computer Science, 2021, 2 (5)
  • [7] Review of Security for Underwater Wireless Sensor Networks
    Su, Yishan
    Zhang, Hehe
    Zhang, Rui
    Ma, Suya
    Fan, Rong
    Fu, Xiaomei
    Jin, Zhigang
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2023, 45 (03) : 1121 - 1133
  • [8] Wireless Sensor Network and Security
    Sharma, Sonia
    [J]. PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 3301 - 3304
  • [9] Wireless Sensor Network Security
    Liu, An
    Kim, Mihui
    Oliveira, Leonardo B.
    Tan, Hailun
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [10] Security on Wireless Sensor Network
    Yapar, Busranur
    Guven, Ebu Yusuf
    Aydin, Muhammed Ali
    [J]. 2019 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2019, : 693 - 698