Junqing Zhang, Yangze Dong, Gangqiang Zhang, Junkai Liu
{"title":"水声网络中MAC层协议的干扰效应研究","authors":"Junqing Zhang, Yangze Dong, Gangqiang Zhang, Junkai Liu","doi":"10.1145/3291940.3291989","DOIUrl":null,"url":null,"abstract":"With the development of underwater acoustic communication and networking, the past forty years have witnessed rapid progress in the application of underwater acoustic networks (UANs). As the necessary component of large-area underwater monitoring and surveillance systems, UANs may confront malicious attacks. Within UANs, MAC layer protocols play an important role in their formation and maintenance. For the sake of the security of UAN itself, it is important to understand the mechanisms of attack against the protocols. One of the main methods is jamming, whose effects are studied in this paper via simulation and experiments. Conflict making, NAV interference and modification of the back-off window interference methods are adapted to gain insight into the approaches of attack, with results showing that the NAV interference method has the better interference effect.","PeriodicalId":429405,"journal":{"name":"Proceedings of the 13th International Conference on Underwater Networks & Systems","volume":"51 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Study on interference effect against MAC layer protocol in underwater acoustic network\",\"authors\":\"Junqing Zhang, Yangze Dong, Gangqiang Zhang, Junkai Liu\",\"doi\":\"10.1145/3291940.3291989\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the development of underwater acoustic communication and networking, the past forty years have witnessed rapid progress in the application of underwater acoustic networks (UANs). As the necessary component of large-area underwater monitoring and surveillance systems, UANs may confront malicious attacks. Within UANs, MAC layer protocols play an important role in their formation and maintenance. For the sake of the security of UAN itself, it is important to understand the mechanisms of attack against the protocols. One of the main methods is jamming, whose effects are studied in this paper via simulation and experiments. Conflict making, NAV interference and modification of the back-off window interference methods are adapted to gain insight into the approaches of attack, with results showing that the NAV interference method has the better interference effect.\",\"PeriodicalId\":429405,\"journal\":{\"name\":\"Proceedings of the 13th International Conference on Underwater Networks & Systems\",\"volume\":\"51 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-12-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 13th International Conference on Underwater Networks & Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3291940.3291989\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 13th International Conference on Underwater Networks & Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3291940.3291989","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Study on interference effect against MAC layer protocol in underwater acoustic network
With the development of underwater acoustic communication and networking, the past forty years have witnessed rapid progress in the application of underwater acoustic networks (UANs). As the necessary component of large-area underwater monitoring and surveillance systems, UANs may confront malicious attacks. Within UANs, MAC layer protocols play an important role in their formation and maintenance. For the sake of the security of UAN itself, it is important to understand the mechanisms of attack against the protocols. One of the main methods is jamming, whose effects are studied in this paper via simulation and experiments. Conflict making, NAV interference and modification of the back-off window interference methods are adapted to gain insight into the approaches of attack, with results showing that the NAV interference method has the better interference effect.