{"id":"https://openalex.org/W3212572738","doi":"https://doi.org/10.1109/icccnt51525.2021.9580104","title":"Mitigating unsecured data forwarding related attack of underwater sensor network","display_name":"Mitigating unsecured data forwarding related attack of underwater sensor network","publication_year":2021,"publication_date":"2021-07-06","ids":{"openalex":"https://openalex.org/W3212572738","doi":"https://doi.org/10.1109/icccnt51525.2021.9580104","mag":"3212572738"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt51525.2021.9580104","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt51525.2021.9580104","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090045753","display_name":"Ashish Hariyale","orcid":null},"institutions":[{"id":"https://openalex.org/I11880225","display_name":"National Institute of Technology Karnataka","ror":"https://ror.org/01hz4v948","country_code":"IN","type":"education","lineage":["https://openalex.org/I11880225"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Ashish Hariyale","raw_affiliation_strings":["National Institute of Technology Karnataka,Department of Computer Science and Engineering,Mangalore,India"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology Karnataka,Department of Computer Science and Engineering,Mangalore,India","institution_ids":["https://openalex.org/I11880225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005226005","display_name":"Aakriti Thawre","orcid":null},"institutions":[{"id":"https://openalex.org/I11880225","display_name":"National Institute of Technology Karnataka","ror":"https://ror.org/01hz4v948","country_code":"IN","type":"education","lineage":["https://openalex.org/I11880225"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Aakriti Thawre","raw_affiliation_strings":["National Institute of Technology Karnataka,Department of Computer Science and Engineering,Mangalore,India"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology Karnataka,Department of Computer Science and Engineering,Mangalore,India","institution_ids":["https://openalex.org/I11880225"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009427723","display_name":"B. R. Chandavarkar","orcid":"https://orcid.org/0000-0001-6944-875X"},"institutions":[{"id":"https://openalex.org/I11880225","display_name":"National Institute of Technology Karnataka","ror":"https://ror.org/01hz4v948","country_code":"IN","type":"education","lineage":["https://openalex.org/I11880225"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"B. R. Chandavarkar","raw_affiliation_strings":["National Institute of Technology Karnataka,Department of Computer Science and Engineering,Mangalore,India"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology Karnataka,Department of Computer Science and Engineering,Mangalore,India","institution_ids":["https://openalex.org/I11880225"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5090045753"],"corresponding_institution_ids":["https://openalex.org/I11880225"],"apc_list":null,"apc_paid":null,"fwci":1.0187,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.75619539,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"9","issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11192","display_name":"Underwater Vehicles and Communication Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2212","display_name":"Ocean Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11192","display_name":"Underwater Vehicles and Communication Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2212","display_name":"Ocean Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9740999937057495,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.929099977016449,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/underwater","display_name":"Underwater","score":0.743525505065918},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7311658263206482},{"id":"https://openalex.org/keywords/underwater-acoustic-communication","display_name":"Underwater acoustic communication","score":0.7056859731674194},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.666770339012146},{"id":"https://openalex.org/keywords/packet-forwarding","display_name":"Packet forwarding","score":0.6041861772537231},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.48065435886383057},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.4229000210762024},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.4141443371772766},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3967928886413574},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.39445334672927856},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.16174101829528809}],"concepts":[{"id":"https://openalex.org/C98083399","wikidata":"https://www.wikidata.org/wiki/Q3246517","display_name":"Underwater","level":2,"score":0.743525505065918},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7311658263206482},{"id":"https://openalex.org/C169111936","wikidata":"https://www.wikidata.org/wiki/Q424098","display_name":"Underwater acoustic communication","level":3,"score":0.7056859731674194},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.666770339012146},{"id":"https://openalex.org/C120317029","wikidata":"https://www.wikidata.org/wiki/Q874048","display_name":"Packet forwarding","level":3,"score":0.6041861772537231},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.48065435886383057},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.4229000210762024},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.4141443371772766},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3967928886413574},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.39445334672927856},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.16174101829528809},{"id":"https://openalex.org/C111368507","wikidata":"https://www.wikidata.org/wiki/Q43518","display_name":"Oceanography","level":1,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt51525.2021.9580104","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt51525.2021.9580104","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Life below water","score":0.7300000190734863,"id":"https://metadata.un.org/sdg/14"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1501167349","https://openalex.org/W1906577849","https://openalex.org/W1982909553","https://openalex.org/W2014715688","https://openalex.org/W2017176661","https://openalex.org/W2075287959","https://openalex.org/W2112525087","https://openalex.org/W2149472588","https://openalex.org/W2161437547","https://openalex.org/W2171273926","https://openalex.org/W2619395208","https://openalex.org/W2803924868","https://openalex.org/W2901904672","https://openalex.org/W3005736927","https://openalex.org/W6676474364"],"related_works":["https://openalex.org/W3081304190","https://openalex.org/W2477841276","https://openalex.org/W4225540233","https://openalex.org/W1989468614","https://openalex.org/W46613192","https://openalex.org/W2539461158","https://openalex.org/W2556643280","https://openalex.org/W2185568765","https://openalex.org/W2353494610","https://openalex.org/W4285703999"],"abstract_inverted_index":{"To":[0],"improve":[1],"communication":[2,54,86,192],"underwater,":[3],"the":[4,37,70,106,111,134,198],"underwater":[5,14,47,57,85,107,181],"sensor":[6,182],"networks":[7,108,114],"(UWSN)":[8],"provide":[9],"gains":[10],"for":[11,115],"many":[12,45,116],"different":[13,117],"applications,":[15],"like":[16,88,120],"Underwater":[17,26,63,72],"Data-centers,":[18],"Aquatic":[19,24],"Monitoring,":[20,25],"Tsunami":[21],"Monitoring":[22],"Systems,":[23],"Oil":[27],"Field":[28],"Discovery,":[29],"Submarine":[30,41],"Target":[31,42],"Localization,":[32],"Surveilling":[33],"Water":[34],"Territory":[35],"of":[36,69,84,110,179,200,208],"Country":[38],"via":[39],"UWSN,":[40],"Localization":[43],"and":[44,100,136,157,193,206,210],"more.":[46],"applications":[48],"are":[49],"dependent":[50],"on":[51,214],"secure":[52,191],"data":[53,73,175],"in":[55,62],"an":[56,180],"environment,":[58],"so":[59,101],"Data":[60],"transmission":[61,74],"Sensor":[64],"Network":[65],"is":[66,76],"a":[67,77,150,170,187],"need":[68],"future.":[71],"itself":[75],"big":[78],"challenge":[79],"due":[80],"to":[81,130,133,141,172,190,196],"various":[82],"limitations":[83],"mediums":[87],"lower":[89],"bandwidth,":[90],"multipath":[91],"effect,":[92],"path":[93],"loss,":[94],"propagation":[95],"delay,":[96],"noise,":[97],"Doppler":[98],"spread,":[99],"on.":[102],"These":[103],"challenges":[104],"make":[105],"one":[109],"most":[112],"vulnerable":[113],"security":[118],"attacks":[119,178],"sinkhole,":[121],"spoofing,":[122],"wormhole,":[123],"misdirection,":[124],"etc.":[125],"It":[126],"causes":[127],"packets":[128,153],"unable":[129],"be":[131,149],"delivered":[132],"destination,":[135],"even":[137],"worse":[138],"forward":[139],"them":[140,160],"malicious":[142,165],"nodes.":[143],"A":[144],"compromised":[145],"node,":[146],"which":[147],"may":[148],"router,":[151],"intercepts":[152],"going":[154],"through":[155],"it,":[156],"selectively":[158],"drops":[159],"or":[161],"can":[162],"perform":[163],"some":[164],"activity.":[166],"This":[167],"paper":[168],"presents":[169],"solution":[171,185],"Mitigate":[173],"unsecured":[174],"forwarding":[176],"related":[177],"network,":[183],"our":[184],"uses":[186],"pre-shared":[188],"key":[189],"hashing":[194],"algorithm":[195],"maintain":[197],"integrity":[199],"stored":[201],"locations":[202],"at":[203],"head":[204],"node":[205],"demonstration":[207],"attack":[209],"its":[211],"mitigation":[212],"done":[213],"Unetstack":[215],"software.":[216]},"counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
