|
I F Akyildiz, D. Pompili and T. Melodia, “State of the art in protocol research for underwater acoustic sensor networks,” Proc of the 1st ACM international workshop on underwater networks, pp. 7-16, New York, 2006
|
|
A. Caiti and A. Munafo', “Adaptive Cooperative Algorithms for AUV Networks,” IEEE International Conference on Communications Workshops (ICC 2010), pp. 1–5, Capetown, May 2010
|
|
T. Chen and H. Yu, “Bilinear Parings in Property-based attestation,” International Conference on Networks Security, pp. 256-260,2010
|
|
Y. P. Cong, G. Yang, Z. Q. Wei, and W. Zhou, “Security in underwater Sensor network,” International Conference on Communication and Mobile Computing, 2010
|
|
J. H. Cui, J. Kong, M. Gerla, and S. Zhou, “The challenges of building mobile underwater wireless networks for aquatic applications,” Network, IEEE, vol. 20, no. 3, pp. 12–18, May-June, 2006
|
|
Y. Dong and P. Liu, “Security consideration of Underwater Acoustic Networks,” International Congress on Acoustics, ICA, 2010
|
|
A. Enge, “Bilinear pairings on elliptic curves,” HAL - INRIA, vol.61,no.1, 2013(DOI 10.4171/LEM/61-1/2-9)
|
|
D. Galindo, R. Roman and J. Lopez, “A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks,” Cryptology and Network Security, pp. 120-132, Springer Berlin Heidelberg ,2008
|
|
Dini Gianluca and Duca Lo Angelica, “A Secure Communication Suite for Underwater Acoustic Sensor Networks,” Sensors ,vol.12, no.11, pp. 15133-15158, 2012
|
|
Z. Guo, H. Luo, F. Hong, M. Yang, and M. Ni Lionel, “Current Progress and Research Issues in Underwater Sensor Networks,” Journal of Computer Research and Development, vol. 47, no.3, pp. 377-389, 2010
|
|
Z. Hu, C. Wang, Y. Zhu, and D. Kong, “Signal Detection for the Underwater Acoustic Voice Communication,” Proc of the International Symposium on Test and Measurement 2003, pp. 1-5, Washington, IEEE, 2003
|
|
M. R. Jafri, S. Ahmed, N. Javaid, Z. Ahmad, and R.J. Qureshi, “AMCTD: Adaptive Mobility of Courier Nodes in Threshold-Optimized DBR Protocol for Underwater Wireless Sensor Networks,” International Journal of Distributed Sensor Networks, vol. 2014, pp. 259-273, 2014
|
|
D. B. Kilfoyle and A. B. Baggeroer, “The State of the Art in Underwater Acoustic Telemetry,” IEEE Journal of oceanic engineering, Vol.25, No.1, pp. 4-27, 2000
|
|
F. Li and P. Liu, “An Efficient Certificateless Signature Scheme from Bilinear Parings,” International Conference on Network Computing & Information Security, pp. 35-37, 2011
|
|
Q. Liang and X. Cheng, “Underwater acoustic sensor networks: Target size detection and performance analysis,” Ad Hoc Networks, vol.7,no.4, pp. 830-808,2009
|
|
H. P. Liu, C. H. Lan, Y. J. Ding, and Q. J. Yue, “An ID-Based Proxy Signature Using Bilinear Pairing,” Journal of Lanzhou Jiaotong University, 2008
|
|
R. Lu, Z. Cao, L. Wang, and C. Sun, “A secure anonymous routing protocol with authenticated key exchange for ad hoc networks,” Computer Standards & Interfaces, vol. 29, no.5, pp. 521–527, 2007
|
|
H. Nasir, N. Javaid, H. Ashraf, and S Manzoor, “CoDBR: Cooperative Depth Based Routing for Underwater Wireless Sensor Networks,”Broadband and Wireless Computing, Communication and Applications (BWCCA), 2014 Ninth International Conference on IEEE, pp. 52-57,2014
|
|
J. Preisig, “Acoustic Propagation Considerations for Underwater Acoustic Communications Network Development,” Acm International Workshop on Underwater Networks, vol. 11, no.4, pp. 1-5, 2006
|
|
J. Rice and D. Green, “Underwater acoustic communications and networks for the US Navy’s Sea web Program,” Proc of the second International Conference on Sensor Technologies and Applications, pp. 715-722, Washington, 2008
|
|
W. K. G. Seah and H. X. Tan, “Multipath Virtual Sink Architecture for Underwater Sensor Networks,” Research Collection School Of Information Systems, 2001
|
|
S. Seys and B. Preneel, “ARM: anonymous routing protocol for mobile ad hoc networks,” Advanced Information Networking and Applications, AINA 2006, 20th International Conference on IEEE, pp. 133-137, 2006
|
|
E. M. Sozer, M. Stojanovic, and J. G.Proakis, “Underwater acoustic networks,” IEEE Journal of Oceanic Engineering, vol.25, no.1, pp. 72-83, 2000
|
|
M. Stojanovic. “Underwater Acoustic Communication: Design Considerations on the Physical Layer,” Wireless on Demand Network Systems and Services, 2008
|
|
Y. Su, Y. Zhu, H. Mo, J. H. Cui, and Z. Jin, “UPC-MAC: A Power Control MAC Protocol for Underwater Sensor Networks,” International Conference on Wireless Algorithms, Systems, and Applications,Vol.7992, pp.377-390,2013
|
|
A. Wahid ,S. Lee , H. J. Jeong , and D. Kim, “EEDBR: Energy-Efficient Depth-Based Routing Protocol for Underwater Wireless Sensor Networks,” Advanced Computer Science and Information Technology, pp. 223-234, Springer Berlin Heidelberg, 2011
|
|
Z. Wei, G. Yang, Y. Cong, and J. Dong, “Analysis of security and threat of underwater wireless sensor network topology,” Proceedings of the ICCEE 2010, Chengdu, pp. 506-510, 2010
|
|
P. Xie, Z. Zhou, Z. Peng, J. H. Cui, and Z. Shi, “SDRT: A reliable data transport protocol for underwater sensor networks,” Ad Hoc Networks, vol.8, no.7, pp. 708-722, 2010
|
|
H. Yan, Z. J. Shi, and J. H. Cui, “DBR: Depth-Based Routing for Underwater Sensor Networks,” Lecture Notes in Computer Science, 4982, pp. 72-86, 2008
|
|
B. Zhu, Z. Wan, M. S. Kankanhalli, F. Bao, and R. H. Deng, “Anonymous Secure Routing in Mobile Ad-Hoc Networks,” IEEE International Conference on Local Computer Networks, Vol.37, pp.102-108, 2004
|
|
M. Zuba, M. Fagan, J. H. Cui, and Z. Shi, “A vulnerability study of geographic routing in Underwater Acoustic Networks,” 2013 IEEE Conference on Communications and Network Security (CNS), pp. 109-117, 2013
|