[1]
Junhong Cui, Jiejun Kong, M. Gerla and Shengli Zhou, The challenges of building mobile underwater wireless networks for aquatic applications, Network, vol. 20, pp.12-18, May. (2006).
DOI: 10.1109/mnet.2006.1637927
Google Scholar
[2]
W. Broecker and T.H. Peng, Tracers in the sea, Eldigio Press, Lamont Doherty Earth Observatory of Columbia University, Palisades, NY, page 689, (1982).
Google Scholar
[3]
Xiangqian Chen, Kia Makki, Kang Yen and N. Pissinou, Sensor network security: a survey, Communications Surveys & Tutorials, vol. 11, pp.52-73, Jun. (2009).
DOI: 10.1109/surv.2009.090205
Google Scholar
[4]
S. Azou, C. Pistre and G. Burel, A Chaotic Direct-Sequence Spread-Spectrum System for Underwater Communication, " in Proc. Oceans, 02, Biloxi, Mississippi, 2002, pp.2409-2415.
DOI: 10.1109/oceans.2002.1192004
Google Scholar
[5]
A. D. Wood and J. A. Stankovic, A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks, chapter in Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, M. Ilyas and I. Mahgoub, Eds., CRC Press, (2004).
DOI: 10.1201/9780203489635.ch32
Google Scholar
[6]
S. Chouhan, R. Bose and M. Balakrishnan, Integrated energy analysis of error correcting codes and modulation for energy efficient wireless sensor nodes, Wireless Communications, vol. 8, pp.5348-5355, (2009).
DOI: 10.1109/twc.2009.090279
Google Scholar
[7]
Yangze Dong and Pingxiang Liu, Security analysis on underwater acoustic networks, in Proc. OCEANS, Yeosu, 2012, p.1–4.
DOI: 10.1109/oceans-yeosu.2012.6263360
Google Scholar
[8]
Yun Zhou, Yuguang Fang and Yanchao Zhang, SECURING WIRELESS SENSOR NETWORKS: A SURVEY, Communications Surveys & Tutorials, vol. 10, pp.6-28, Sept. (2008).
DOI: 10.1109/comst.2008.4625802
Google Scholar
[9]
I. F. Akyildiz, D. Pompili, and T. Melodia, Underwater Acoustic Sensor Networks: Research Challenges, AdHoc Network, vol. 3, no. 3, Mar. (2005).
DOI: 10.1016/j.adhoc.2005.01.004
Google Scholar
[10]
C. Karlof and D. Wagner, Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures, in Proc. First IEEE International Workshop on Sensor Network Protocols and Applications, 2003, p.113–127.
DOI: 10.1109/snpa.2003.1203362
Google Scholar
[11]
Hong-Yu Hu, Hui-Mei Lu, Yuan-Da Cao and Si-Min Rao, Dynamic hierarchical multicast routing with delaybandwidth constraints, Chinese Journal of Computers. vol. 32, pp.564-575, Mar. (2009).
Google Scholar
[12]
Yuh-Shyan Chen and Yun-Wei Lin, Mobicast Routing Protocol for Underwater Sensor Networks, Sensors Journal, vol. 13, p.737–749, (2013).
DOI: 10.1109/jsen.2012.2226877
Google Scholar
[13]
J. Kong, Z. Ji, W. Wang, M. Gerla, R. Bagrodia, and B. Bhargava, Low-cost Attacks against Packet Delivery, Localization and Synchronization Services in Under-Water Sensor Networks, in Proc. WiSe, (2005).
DOI: 10.1145/1080793.1080808
Google Scholar
[14]
Weichao Wang, Jiejun Kong, Bharat Bhargava, and Mario Gerla, Visualization of wormholes in underwater sensor networks: a distributed approach, Security and Networks, Vol. 3, pp.10-23, (2008).
DOI: 10.1504/ijsn.2008.016198
Google Scholar
[15]
R. Zhang and Y. Zhang, Wormhole-Resilient Secure Neighbor Discovery in Underwater Acoustic Networks, in Proc. INFOCOM, San Diego, 2010, pp.1-9.
DOI: 10.1109/infcom.2010.5462093
Google Scholar
[16]
Shuai Wang, Secure Localization Algorithm for Underwater Wireless Sensor Networks, China New Telecommunications, pp.69-73, February (2008).
Google Scholar
[17]
Song Zhang, Deshi Li and Jian Chen, A Link-State Based Adaptive Feedback Routing for Underwater Acoustic Sensor Networks, Sensors Journal, vol. 13, p.4402–4412, (2013).
DOI: 10.1109/jsen.2013.2269796
Google Scholar
[18]
J. Deng, R. Han, and S. Mishra, Actuation sensor with adaptive routing and QOS aware checkpoint arrangement on Wireless Multimedia Sensor Network, in Proc. ICRTIT, Chennai, Tamil Nadu, 2011, pp.444-449.
DOI: 10.1109/icrtit.2011.5972331
Google Scholar
[19]
J. Newsome, E. Shi, D. Song and A. Perrig, The Sybil Attack in Sensor Networks: Analysis and Defenses, in Proc. IPSN, 2004, pp.259-268.
DOI: 10.1145/984622.984660
Google Scholar
[20]
T. Aura, P. Nikander, and J. Leiwo, DOS-Resistant Authentication with Client Puzzles, in Proc. Security Protocols Workshop, New York, 2000, pp.170-177.
DOI: 10.1007/3-540-44810-1_22
Google Scholar
[21]
J. G. Proakis, E. M. Sozer, J. A. Rice, and M. Stojanovic, Shallow Water Acoustic Networks, Communications, vol. 39, pp.114-119, Nov. (2001).
DOI: 10.1109/35.965368
Google Scholar
[22]
S. Choochaisri, S. Aurburananont, A. Saowwapak-adisak, C. Intanagonwiwat, DeVise: A tool for visualizing and validating desynchronization protocols for multi-hop wireless sensor networks, in Proc. ECTI-CON, Phetchaburi, 2012, pp.1-4.
DOI: 10.1109/ecticon.2012.6254332
Google Scholar
[23]
David R. Raymond and S.F. Midkiff, Clustered Adaptive Rate Limiting: Defeating Denial-of-Sleep Attacks in Wireless Sensor Networks, in Proc. MILCOM, Orlando, 2007, p.1–7.
DOI: 10.1109/milcom.2007.4455251
Google Scholar
[24]
A. Hagedorn, D. Starobinski, A. Trachtenberg, Rateless Deluge: Over-the-Air Programming of Wireless Sensor Networks Using Random Linear Codes, in Proc. IPSN, St. Louis, 2008, p.457–466.
DOI: 10.1109/ipsn.2008.9
Google Scholar