A survey of sybil attack countermeasures in underwater sensor and acoustic networks
Underwater sensor and acoustic networks have several unique applications including water quality and ocean life monitoring, as well as ocean navigation and exploration. They also have peculiar physical layer characteristics with respect to operating frequency and attenuation which makes them differe...
| Main Authors: | Ahmad Zukarnain, Zuriati, Amodu, Oluwatosin Ahmed, Wenting, Cui, Bukar, Umar Ali |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Institute of Electrical and Electronics Engineers
2023
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/106780/ http://psasir.upm.edu.my/id/eprint/106780/1/106780.pdf |
Similar Items
A survey of Sybil attack countermeasures in IoT-based wireless sensor networks
by: Arshad, Akashah, et al.
Published: (2021)
by: Arshad, Akashah, et al.
Published: (2021)
Energy trust system for detecting sybil attack in clustered wireless sensor networks
by: Alsaedi, Noor, et al.
Published: (2015)
by: Alsaedi, Noor, et al.
Published: (2015)
Energy trust system for detecting sybil attacks in clustered wireless sensor network
by: Hussein, Noor Sabeeh
Published: (2016)
by: Hussein, Noor Sabeeh
Published: (2016)
Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS)
by: Alsaedi, Noor, et al.
Published: (2017)
by: Alsaedi, Noor, et al.
Published: (2017)
Factor-based LEACH (FLEACH) protocol for extending Wireless Sensor Networks' lifetime
by: Ahmed, Amodu Oluwatosin
Published: (2016)
by: Ahmed, Amodu Oluwatosin
Published: (2016)
A survey on the design aspects and opportunities in age-aware UAV-aided data collection for sensor networks and Internet of Things applications
by: Amodu, Oluwatosin Ahmed, et al.
Published: (2023)
by: Amodu, Oluwatosin Ahmed, et al.
Published: (2023)
An overview of attacks against digital watermarking and their respective countermeasures
by: Tanha, Maryam, et al.
Published: (2012)
by: Tanha, Maryam, et al.
Published: (2012)
A walk through SQL injection: vulnerabilities, attacks, and countermeasures in current and future networks
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
Impact of blackhole and Sybil attacks on dynamic windows secured implicit geographic forwarding routing protocol
by: Mohd Hanapi, Zurina, et al.
Published: (2014)
by: Mohd Hanapi, Zurina, et al.
Published: (2014)
MANET security appraisal: Challenges, essentials, attacks, countermeasures & future directions
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
An efficient secure and energy resilient trust-based system for detection and mitigation of sybil attack detection (SAN)
by: Hussain, Muhammad Zunnurain, et al.
Published: (2024)
by: Hussain, Muhammad Zunnurain, et al.
Published: (2024)
A novel energy-efficient sybil node detection algorithm for intrusion detection system in wireless sensor networks
by: Karuppiah, A. Babu, et al.
Published: (2014)
by: Karuppiah, A. Babu, et al.
Published: (2014)
Stochastic geometry-based analysis of relay-assisted spectrum sharing future generation wireless networks
by: Ahmed, Amodu Oluwatosin
Published: (2020)
by: Ahmed, Amodu Oluwatosin
Published: (2020)
Fundamental design aspects of UAV-enabled MEC systems: a review on models, challenges, and future opportunities
by: Adnan, Mohd Hirzi, et al.
Published: (2024)
by: Adnan, Mohd Hirzi, et al.
Published: (2024)
GPS-less Localization Protocol for Underwater Acoustic Networks
by: Othman, A.K.
Published: (2008)
by: Othman, A.K.
Published: (2008)
IPTV network security: threats and countermeasures
by: M. S. A., Noman Ranak, et al.
Published: (2018)
by: M. S. A., Noman Ranak, et al.
Published: (2018)
Node replication attacks in mobile wireless sensor network: a survey
by: Shaukat, Haafizah Rameeza, et al.
Published: (2014)
by: Shaukat, Haafizah Rameeza, et al.
Published: (2014)
Underwater sensor network for monitoring applications
by: Kuan,, Yee Chiang
Published: (2009)
by: Kuan,, Yee Chiang
Published: (2009)
Investigating and analyzing simulation tools of wireless sensor networks: a comprehensive survey
by: Adday, Ghaihab Hassan, et al.
Published: (2024)
by: Adday, Ghaihab Hassan, et al.
Published: (2024)
Applications of Underwater Acoustics in Polar Environments
by: Gavrilov, Alexander, et al.
Published: (2017)
by: Gavrilov, Alexander, et al.
Published: (2017)
Blind Separation of Underwater Acoustic Signals
by: Mansour, Ali, et al.
Published: (2006)
by: Mansour, Ali, et al.
Published: (2006)
Taxonomy of attacks on wireless sensor networks
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Fault tolerance structures in Wireless Sensor Networks (WSNs): survey, classification, and future directions
by: Adday, Ghaihab Hassan, et al.
Published: (2022)
by: Adday, Ghaihab Hassan, et al.
Published: (2022)
A new countermeasure to combat the embedding-based attacks on the Goldreich-Goldwasser-Halevi lattice-based cryptosystem
by: Mandangan, Arif, et al.
Published: (2024)
by: Mandangan, Arif, et al.
Published: (2024)
A survey on addressing iot security issues by embedding blockchain technology solutions: review, attacks, current trends, and applications
by: Huan, Nathalie Tan Yhe, et al.
Published: (2024)
by: Huan, Nathalie Tan Yhe, et al.
Published: (2024)
Energy harvesting based routing protocol for underwater sensor networks
by: Khan, Adil, et al.
Published: (2019)
by: Khan, Adil, et al.
Published: (2019)
A high-throughput routing metric for multi-hop underwater acoustic networks
by: Azad, Saiful, et al.
Published: (2015)
by: Azad, Saiful, et al.
Published: (2015)
Transient underwater acoustic channel simulator development
by: Caley, M., et al.
Published: (2013)
by: Caley, M., et al.
Published: (2013)
Security attacks and challenges in wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
Security attacks and challenges in wireless sensor networks
by: Pathan, Al-Sakib Khan
Published: (2008)
by: Pathan, Al-Sakib Khan
Published: (2008)
Dynamic Cluster Based Routing for Underwater
Wireless Sensor Networks
by: Muhammad, Ayaz, et al.
Published: (2010)
by: Muhammad, Ayaz, et al.
Published: (2010)
Underwater Wireless Sensor Networks: Routing Issues and Future Challenges
by: Muhammad, Ayaz, et al.
Published: (2009)
by: Muhammad, Ayaz, et al.
Published: (2009)
The performance of directional flooding routing protocol for underwater sensor networks
by: Idrus, Nur Asfarina
Published: (2015)
by: Idrus, Nur Asfarina
Published: (2015)
Totally opportunistic routing algorithm for underwater wireless sensor network
by: Rahman, Ziaur
Published: (2019)
by: Rahman, Ziaur
Published: (2019)
Adaptive Modulation Schemes for Underwater Acoustic OFDM
Communication
by: Barua, Suchi
Published: (2023)
by: Barua, Suchi
Published: (2023)
A General Structure for the Separation of Underwater Acoustic Signals
by: Bencekroun, N., et al.
Published: (2006)
by: Bencekroun, N., et al.
Published: (2006)
Countermeasure for Mould Growths in Operation Theatre
by: Teoh, Yan Heng, et al.
Published: (2015)
by: Teoh, Yan Heng, et al.
Published: (2015)
Tyre Cavity Coupling Resonance and Countermeasures
by: Zamri, Mohamed, et al.
Published: (2012)
by: Zamri, Mohamed, et al.
Published: (2012)
Totally Opportunistic Routing Algorithm (TORA) for underwater wireless sensor network
by: Rahman, Ziaur, et al.
Published: (2018)
by: Rahman, Ziaur, et al.
Published: (2018)
Evaluation approach for efficient countermeasure techniques against denial-of-service attack on MPSoC-based IoT using multi-criteria decision-making
by: Al-Hchaimi, Ahmed Abbas Jasim, et al.
Published: (2022)
by: Al-Hchaimi, Ahmed Abbas Jasim, et al.
Published: (2022)
Similar Items
-
A survey of Sybil attack countermeasures in IoT-based wireless sensor networks
by: Arshad, Akashah, et al.
Published: (2021) -
Energy trust system for detecting sybil attack in clustered wireless sensor networks
by: Alsaedi, Noor, et al.
Published: (2015) -
Energy trust system for detecting sybil attacks in clustered wireless sensor network
by: Hussein, Noor Sabeeh
Published: (2016) -
Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS)
by: Alsaedi, Noor, et al.
Published: (2017) -
Factor-based LEACH (FLEACH) protocol for extending Wireless Sensor Networks' lifetime
by: Ahmed, Amodu Oluwatosin
Published: (2016)