{"title":"水声网络自重组的仿真研究","authors":"Yangze Dong, Pingxiang Liu","doi":"10.1109/ICINFA.2011.5949064","DOIUrl":null,"url":null,"abstract":"Security is one of the ultimate goals of Underwater Acoustic Networks. The security considerations must be carried out during the construction of the network. But at the worst conditions, the network may be destroyed by adverse attacks. It must be restored in some extents for continuous usage.","PeriodicalId":299418,"journal":{"name":"2011 IEEE International Conference on Information and Automation","volume":"492 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Simulation study on self-reorganization of Underwater Acoustic Networks\",\"authors\":\"Yangze Dong, Pingxiang Liu\",\"doi\":\"10.1109/ICINFA.2011.5949064\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security is one of the ultimate goals of Underwater Acoustic Networks. The security considerations must be carried out during the construction of the network. But at the worst conditions, the network may be destroyed by adverse attacks. It must be restored in some extents for continuous usage.\",\"PeriodicalId\":299418,\"journal\":{\"name\":\"2011 IEEE International Conference on Information and Automation\",\"volume\":\"492 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-06-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 IEEE International Conference on Information and Automation\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICINFA.2011.5949064\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 IEEE International Conference on Information and Automation","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICINFA.2011.5949064","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Simulation study on self-reorganization of Underwater Acoustic Networks
Security is one of the ultimate goals of Underwater Acoustic Networks. The security considerations must be carried out during the construction of the network. But at the worst conditions, the network may be destroyed by adverse attacks. It must be restored in some extents for continuous usage.