References
- S.J. Park, S.H. Park, S.K. Kim, and C.H. Kim, "Underwater Communication and Ocean Sensor Network Technology," Communications of the Korean Institute of Information Scientists and Engineers, Vol. 28, No. 7, pp. 79-88, 2010.
- H.W. Nam, S.S. An, C.H. Kim, S.H. Park, Y.H. Kim, and S.H. Lim, "Remote Monitoring System Based on Ocean Sensor Networks for Offshore Aquaculture," Proceeding of IEEE Oceanic Engineering Society, pp. 14-19, 2014.
- D.H. Shin and C.H. Kim, “Sensor Network System for Littoral Sea Cage Culture Monitoring,” Korea Information Proceesing Society Transaction on Computer and Communication System, Vol. 5, No. 9, pp. 247-260, 2016.
- D.H. Shin and C.H. Kim, "Data Compression Method for Reducing Sensor Data Loss and Error in Wireless Sensor Network," Journal of Korea Multimedia Society, Vol. 19, No. 2, pp. 360-374, 2016. https://doi.org/10.9717/kmms.2016.19.2.360
- R. Martin and S. Rajasekaran, "Data Centric Approach to Analyzing Security Threats in Underwater Sensor Networks," Proceeding of OCEANS 2016 Marine Technology Society/IEEE Monterey, pp. 1-5, 2016.
- G. Han, J. Jiang, N. Sun, and L. Shu, “Secure Communication for Underwater Acoustic Sensor Networks,” IEEE Communication Magazine, Vol. 53, No. 8, pp. 54-60, 2015. https://doi.org/10.1109/MCOM.2015.7180508
- E. Michael, Whitman and J. Herbert Mattord, Principles of Information Security, CENGAGE Learning, U.K., 2017.
- H.J. Seo and H.W. Kim, "On Dynamic Voltage Scale Based Protocol Low Power Underwater Secure Communications on Sensor Network," Journal of the Korea Institute of Information and Communication Engineering, Vol. 18, No. 3, pp. 586-594, 2014. https://doi.org/10.6109/jkiice.2014.18.3.586
- H. Li, Y. He, X. Cheng, H. Zhu, and L. Sun, “Security and Privacy in Localization for Underwater Sensor Networks,” IEEE Communications Magazine, Vol. 53, No. 11, pp. 56-62, 2015. https://doi.org/10.1109/MCOM.2015.7321972
- S.J. Lee, D.H. Shin, and C.H. Kim, "Improvement of Verified Neighbor Discovery Protocol Based on Directional Antenna to Detect Wormhole in Underwater Acoustic Sensor Networks," Proceeding of the 2017 World Congress on Information Technology Applications and Services, pp. 1-8, 2017.
- M.H. Park, Y. Kim, and O.Y. Yi, “Light Weight Authentication and Key Establishment Protocol for Underwater Acoustic Sensor Networks,” Journal of the Korea Institute of Information and Communication Engineering B, Vol. 39, No. 6, pp. 360-369, 2014.
- A.H. Moon, U. Iqbal, and G.M. Bhat, "Light Weight Authentication Framework for WSN," Proceeding of International Conference on Electrical, Electronics, and Optimization Techniques, pp. 3099-2105, 2016.
- C.W. Yun, J.H. Lee, O.Y. Yi, S.Y. Shin, and S.H. Park, "Analysis of the Cryptographic Algorithms's Performance on Various Devices Suitable for Underwater Communications", Korea Information Proceesing Society Transaction on Computer and Communications System, Vol. 5, No. 3, pp. 71-78, 2016.