Defense against underwater spy-robots: A distributed anti-theft topology control mechanism for insecure UASN

L Liu, Y Zhou, Z Xi, J Wu, J Xu - Computers & Security, 2023 - Elsevier
Abstract Underwater Acoustic Sensor Network (UASN) is deployed for various underwater
applications, such as underwater creature tracking and underwater tactical surveillance …

Strengthening the achilles' heel: An AUV-aided message ferry approach against dissemination vulnerability in UASNs

L Liu, Z Xi, J Wu - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
Underwater acoustic sensor networks (UASNs) have attracted considerable attention due to
the increasing demands on the Internet of Underwater Things. The monitored underwater …

Entropy optimization of degree distributions against security threats in UASNs

L Liu, Z Zhang, J Wu, J Xu - Computer Networks, 2022 - Elsevier
Abstract Underwater Acoustic Sensor Networks (UASNs) are deployed for various
underwater applications, such as underwater creature tracking and tactical surveillance …

Message piece dissemination approach for opportunistic underwater sensor network invaded by underwater spy‐robots

L Liu, H Zhang, J Wu, J Xu - Software: Practice and Experience, 2022 - Wiley Online Library
Opportunistic underwater sensor network (OUSN) is deployed for various underwater
applications, such as underwater creatures tracking and tactical surveillance. Particularly …

Noise-based-protection message dissemination method for insecure opportunistic underwater sensor networks

L Liu, Z Xi, J Wu, J Xu - IEEE Transactions on Information …, 2022 - ieeexplore.ieee.org
Opportunistic Underwater Sensor Networks (OUSNs) are deployed for various underwater
applications, such as underwater creature tracking and tactical surveillance. In an OUSN …

A secure transmission scheme with energy-efficient cooperative jamming for underwater acoustic sensor networks

Y Su, L Li, R Fan, Y Liu, Z Jin - IEEE Sensors Journal, 2022 - ieeexplore.ieee.org
Underwater acoustic sensor networks (UASNs) face many security threats since they are
deployed in open or even hostile environments. How to ensure the confidentiality of data …

A collision-free-transmission-based source location privacy protection scheme in UASNs under time slot allocation

G Han, Y Liu, H Wang, Y Zhang - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Underwater acoustic sensor networks (UASNs) are data driven, and the data generation is
infeasible without source nodes, sensors, and equipment deployed underwater. However …

An active jamming-based helper deployment scheme for underwater acoustic sensor networks

Y Su, G Pan, L Li, R Fan - Ad Hoc Networks, 2024 - Elsevier
Underwater acoustic sensor networks (UASNs) are usually deployed in unattended, opaque
and even hostile environments; thus, they may face serious threats. In the last few years …

Agent‐based secure routing for underwater acoustic sensor networks

MR Bharamagoudra, SS Manvi - International Journal of …, 2017 - Wiley Online Library
The underwater networks have severe security implications and are vulnerable to various
types of attacks such as selective forwarding, wormhole, and sinkhole. Neighbor discovery …

[PDF][PDF] Securing underwater wireless communication networks

DN Kumar - International Journal of Engineering & Technology, 2018 - scholar.archive.org
Underwater remote correspondence systems (UWCNs) are especially defenseless against
vindictive assaults because of the high piece blunder rates, huge and variable proliferation …