Although they give guidelines to contrast such attacks, they do n

Although they give guidelines to contrast such attacks, they do not propose any concrete solution.Some solutions to specific security problems have been presented. Dong et al. have proposed mechanisms for network reconfiguration when one or more nodes get sellekchem destroyed [9,10]. Solutions against wormholes have been presented in [11,12]. Zuba et al. study the effects of denial-of-service jamming attacks on UANs using real-world field tests by building Inhibitors,Modulators,Libraries their own hardware jammer [13]. They show that underwater acoustic networks can be easily jammed by carefully Inhibitors,Modulators,Libraries using timed attacks, which are energy efficient. Finally, Liu and Zhang have proposed a key establishment scheme that is based on the channel characteristics [14] whereas Liu et al.

have proposed a key distribution scheme based on the mobility model of underwater mobile sensors [15].

In this paper, we face with an orthogonal problem, namely secure end-to-end communication. We present a secure communication suite that: (i) protects end-to-end communication; (ii) supports both the one-to-one and one-to-many communication model; (iii) allows Inhibitors,Modulators,Libraries secure network reconfiguration due to nodes mobility, joining and leaving; and finally, (iv) has been evaluated in the real-world Inhibitors,Modulators,Libraries field. To the best of our knowledge, no such a contribution has been given so far. Cong et al. have proposed a cross-layer scheme for secure communication but they do not go further than illustrating the basic ideas underlying their proposal [16].

In particular, they do not provide an implementation and a performance evaluation.

The communication suite is composed of two components, a set of cryptographic primitives and a secure routing protocol. Inhibitors,Modulators,Libraries As to the cryptographic primitives, they have been initially proposed in [17]. Then, in [18] we have employed Inhibitors,Modulators,Libraries them to protect application-level communications. Here, we present the integration of the primitives with Inhibitors,Modulators,Libraries the routing protocol and show that they are adequate at the Carfilzomib network-layer too. As to the secure routing protocol, the basic ideas behind it have been sketched in [19]. Here, we provide a complete and detailed description of the protocol as well as an evaluation of its performance.3.

?System ModelWe consider an underwater surveillance system aimed at protecting a critical asset by means of an underwater acoustic Anacetrapib network.

The system is composed of either a set of networked underwater nodes, each equipped with sensing, computing and acoustic communication facilities. Every underwater node has computational resources and power saving capabilities comparable to those of a low-budget personal selleck kinase inhibitor computer (e.g., a PC/104 embedded computer) and it is able to run a commodity operating system such as Windows XP or L
Embedded systems have different characteristics compared with general-purpose systems. On the one hand, embedded systems combine software and hardware to run a specific and fixed set of applications.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>