Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Application of Bionics in Underwater Acoustic Covert Communication

    In order to overcome the problems brought by traditional covert communication methods, based on bionics, this paper adopts real or simulated dolphin calls as communication signals to achieve the effect of cove...

    Kaiwei Lian, Jiaqi Shen, **angdang Huang in The 2020 International Conference on Machi… (2021)

  2. No Access

    Chapter and Conference Paper

    Hybrid Mac Protocol Based on Security in Clustering Topology

    Underwater wireless sensor networks use acoustic waves as the transmission medium which have shortcomings such as long propagation delay, limited bandwidth and time-varying. Because of the openness of underwat...

    Wei Dong, Yanxia Chen, **angdang Huang in The 2020 International Conference on Machi… (2021)

  3. No Access

    Chapter and Conference Paper

    False Data Filtering in Underwater Wireless Sensor Networks

    Nowadays, people pay more and more attention to the safety of Marine Territory and the development and utilization of marine resources. Underwater wireless sensor networks (UWSNs) [1] technology has become one of...

    Na Liu, Haijie Huang, **angdang Huang in The 2020 International Conference on Machi… (2021)

  4. No Access

    Chapter and Conference Paper

    Safety Situation Assessment of Underwater Nodes Based on BP Neural Network

    With the wide application of underwater wireless sensor network, underwater node positioning technology also plays an important role in underwater wireless sensor network. However, nodes are very easy to be ca...

    Haijie Huang, Kun Liang, **angdang Huang in The 2020 International Conference on Machi… (2021)

  5. No Access

    Chapter and Conference Paper

    A Data Privacy Protection Scheme for Underwater Network

    Underwater sensor network is deployed in unattended underwater environment, which can be used to collect sensitive information. It has problems such as low bandwidth, high energy consumption and difficulty in ...

    Dandan Chen, Shijie Sun, **angdang Huang in The 2020 International Conference on Machi… (2021)

  6. No Access

    Chapter and Conference Paper

    CS-Based Homomorphism Encryption and Trust Scheme for Underwater Acoustic Sensor Networks

    Underwater acoustic sensor networks (UASNs) have been exploited in many applications. However, due to the complex, unattended and, worse still, hostile deployment environment of the networks, they are vulnerab...

    Kun Liang, Haijie Huang, **angdang Huang in The 2020 International Conference on Machi… (2021)

  7. No Access

    Chapter and Conference Paper

    Energy-Saving and Efficient Underwater Wireless Sensor Network Security Data Aggregation Model

    Due to the inherent characteristics of resource constrained sensors, communication overhead has always been a major problem in underwater wireless sensor networks. Data aggregation is an important technology ...

    Shijie Sun, Dandan Chen, Na Liu in The 2020 International Conference on Machi… (2021)

  8. No Access

    Chapter and Conference Paper

    Research on Underwater Bionic Covert Communication

    Due to the particularity of the underwater environment, underwater acoustic communication is an inevitable choice for underwater wireless sensor networks (UWSNs) communication. In recent years, with the develo...

    Jiaqi Shen, Kaiwei Lian, Qiuling Yang in The 2020 International Conference on Machi… (2021)