Related references
Note: Only part of the references are listed.Vulnerabilities of underwater acoustic networks to denial-of-service jamming attacks
Michael Zuba et al.
SECURITY AND COMMUNICATION NETWORKS (2015)
Iterative Key Distribution Based on MAD Neighborhood in Underwater Mobile Sensor Networks
Chuan-Gang Liu et al.
COMPUTER JOURNAL (2012)
Secure Cooperation of Autonomous Mobile Sensors Using an Underwater Acoustic Network
Andrea Caiti et al.
SENSORS (2012)
SECURING UNDERWATER WIRELESS COMMUNICATION NETWORKS
Mari Carmen Domingo
IEEE WIRELESS COMMUNICATIONS (2011)
Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systems
Alvaro A. Cardenas et al.
AD HOC NETWORKS (2009)
Overview of Networking-Protocols for Underwater Wireless Communications
Dario Pompili et al.
IEEE COMMUNICATIONS MAGAZINE (2009)
Wireless sensor network survey
Jennifer Yick et al.
COMPUTER NETWORKS (2008)