On securing underwater acoustic networks: A survey
S Jiang - IEEE Communications Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Underwater acoustic networks (UWANs) are often deployed in unattended and
untransparent or even hostile environments and face many security threats, while many …
untransparent or even hostile environments and face many security threats, while many …
Secure group communication in wireless sensor networks: a survey
O Cheikhrouhou - Journal of Network and Computer Applications, 2016 - Elsevier
Abstract Wireless Sensor Networks (WSN) consist of a large number of sensor nodes which
are often deployed in an unattended harsh environment. As they are exposed to a wide …
are often deployed in an unattended harsh environment. As they are exposed to a wide …
Underwater acoustic wireless sensor networks: advances and future trends in physical, MAC and routing layers
S Climent, A Sanchez, JV Capella, N Meratnia… - Sensors, 2014 - mdpi.com
This survey aims to provide a comprehensive overview of the current research on
underwater wireless sensor networks, focusing on the lower layers of the communication …
underwater wireless sensor networks, focusing on the lower layers of the communication …
IRS-aided secure reliable underwater acoustic communications
Recently, there has been a growing deployment of buoyed nodes on the sea surface for
tactical acoustic communications with autonomous underwater vehicles (AUVs). This …
tactical acoustic communications with autonomous underwater vehicles (AUVs). This …
Considerations on security in zigbee networks
ZigBee outlines a new suite of protocols targeted at low-rate, low-power devices and sensor
nodes. ZigBee Specification includes a number of security provisions and options. The …
nodes. ZigBee Specification includes a number of security provisions and options. The …
[HTML][HTML] A secure communication suite for underwater acoustic sensor networks
In this paper we describe a security suite for Underwater Acoustic Sensor Networks
comprising both fixed and mobile nodes. The security suite is composed of a secure routing …
comprising both fixed and mobile nodes. The security suite is composed of a secure routing …
Logical tree based secure rekeying management for smart devices groups in IoT enabled WSN
With the rapid growth in a huge number of devices connecting online, Internet of Things (IoT)
is rapidly growing and getting interested of researchers. IoT enabled wireless sensor …
is rapidly growing and getting interested of researchers. IoT enabled wireless sensor …
Secure cooperation of autonomous mobile sensors using an underwater acoustic network
Methodologies and algorithms are presented for the secure cooperation of a team of
autonomous mobile underwater sensors, connected through an acoustic communication …
autonomous mobile underwater sensors, connected through an acoustic communication …
An Ultra‐Lightweight Encryption Scheme in Underwater Acoustic Networks
C Peng, X Du, K Li, M Li - Journal of Sensors, 2016 - Wiley Online Library
We tackle a fundamental security problem in underwater acoustic networks (UANs). The S‐
box in the existing block encryption algorithm is more energy consuming and unsuitable for …
box in the existing block encryption algorithm is more energy consuming and unsuitable for …
A survey on secure group communication schemes with focus on iot communication
A key feature for Internet of Things (IoT) is to control what content is available to each user.
To handle this access management, encryption schemes can be used. Due to the diverse …
To handle this access management, encryption schemes can be used. Due to the diverse …