Demonstration of Selective Forwarding Attack and Detection Mechanism in UnetStack3

dc.contributor.authorChandavarkar, B.R.
dc.contributor.authorSuresh, N.
dc.date.accessioned2026-02-06T06:36:05Z
dc.date.issued2021
dc.description.abstractUnderwater networks provide new possibilities that can greatly improve our ability to observe and predict the ocean. Underwater acoustic sensor networks (UASNs) are frequently used in uncharted and unexplored waters, making them vulnerable to various security threats. Applications based on UASNs such as coastal defense, pollution monitoring, assisted navigation to name a few, require secure communication. Various communication protocols and algorithms have been developed to enable collaborative monitoring tasks. However, These protocols often place a low priority on security. Impersonating nodes or illegally manipulating routing information can affect the entire network, making UASNs vulnerable to attacks such as selective forwarding, sinkhole attack, Sybil attack, acknowledgement spoofing and HELLO flood attack. The lack of security against such threats is startling, since security is indeed an important requirement in many emerging civilian and military applications. This paper takes a look at the selective forwarding attack, examines a model as well as a detection mechanism created in UnetStack3. © 2021 IEEE.
dc.identifier.citation2021 12th International Conference on Computing Communication and Networking Technologies, ICCCNT 2021, 2021, Vol., , p. -
dc.identifier.urihttps://doi.org/10.1109/ICCCNT51525.2021.9580125
dc.identifier.urihttps://idr.nitk.ac.in/handle/123456789/30231
dc.publisherInstitute of Electrical and Electronics Engineers Inc.
dc.subjectSecurity
dc.subjectSelective Forwarding(SF)
dc.subjectUnderwater acoustic sensor network(UASN)
dc.subjectUnetStack3
dc.subjectWireless Sensor Network(WSN)
dc.titleDemonstration of Selective Forwarding Attack and Detection Mechanism in UnetStack3

Files