A Survey of Sybil Attack Countermeasures in Underwater Sensor and Acoustic Networks
Underwater sensor and acoustic networks have several unique applications including water quality and ocean life monitoring, as well as ocean navigation and exploration. They also have peculiar physical layer characteristics with respect to operating frequency and attenuation which makes them differe...
Saved in:
Published in | IEEE access Vol. 11; pp. 64518 - 64543 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Piscataway
IEEE
2023
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Underwater sensor and acoustic networks have several unique applications including water quality and ocean life monitoring, as well as ocean navigation and exploration. They also have peculiar physical layer characteristics with respect to operating frequency and attenuation which makes them different from terrestrial wireless sensor communication. Thus, coupled with their large cost of deployment and sensitivity, they are highly vulnerable to security attacks. For instance, a Sybil node could pretend to be at several other locations in the sparse network simultaneously, thereby deceiving legitimate nodes and infringing on the security of transmitted information. Over the last few years, researchers have studied means of preventing, detecting, and mitigating Sybil attacks for safe underwater communication under different assumptions and architectural setups. However, to our knowledge, these efforts have been scattered in the literature and concrete lessons have not been drawn from these efforts via a survey/review on this subject towards achieving safe underwater communication. This motivates the presentation of this paper that provides an exposition of the academic discussion on the solutions for addressing Sybil attacks in underwater wireless communication, with respect to attack prevention, detection and mitigation while identifying some of their limitations. Similarly, proposed methods and technical aspects peculiar to these works are identified, and a wide range of challenges, opportunities, and recommendations are provided. |
---|---|
AbstractList | Underwater sensor and acoustic networks have several unique applications including water quality and ocean life monitoring, as well as ocean navigation and exploration. They also have peculiar physical layer characteristics with respect to operating frequency and attenuation which makes them different from terrestrial wireless sensor communication. Thus, coupled with their large cost of deployment and sensitivity, they are highly vulnerable to security attacks. For instance, a Sybil node could pretend to be at several other locations in the sparse network simultaneously, thereby deceiving legitimate nodes and infringing on the security of transmitted information. Over the last few years, researchers have studied means of preventing, detecting, and mitigating Sybil attacks for safe underwater communication under different assumptions and architectural setups. However, to our knowledge, these efforts have been scattered in the literature and concrete lessons have not been drawn from these efforts via a survey/review on this subject towards achieving safe underwater communication. This motivates the presentation of this paper that provides an exposition of the academic discussion on the solutions for addressing Sybil attacks in underwater wireless communication, with respect to attack prevention, detection and mitigation while identifying some of their limitations. Similarly, proposed methods and technical aspects peculiar to these works are identified, and a wide range of challenges, opportunities, and recommendations are provided. |
Author | Amodu, Oluwatosin Ahmed Bukar, Umar Ali Zukarnain, Zuriati Ahmad Wenting, Cui |
Author_xml | – sequence: 1 givenname: Zuriati Ahmad orcidid: 0000-0003-2408-6956 surname: Zukarnain fullname: Zukarnain, Zuriati Ahmad email: zuriati@upm.edu.my organization: Department of Communication Technology and Network, Universiti Putra Malaysia (UPM), Selangor, Malaysia – sequence: 2 givenname: Oluwatosin Ahmed orcidid: 0000-0002-4078-6066 surname: Amodu fullname: Amodu, Oluwatosin Ahmed email: amodu_o_a@ieee.org organization: Department of Electrical, Electronics and Systems Engineering, Universiti Kebangsaan Malaysia (UKM), Bangi, Selangor, Malaysia – sequence: 3 givenname: Cui orcidid: 0009-0002-0732-0261 surname: Wenting fullname: Wenting, Cui organization: Department of Communication Technology and Network, Universiti Putra Malaysia (UPM), Selangor, Malaysia – sequence: 4 givenname: Umar Ali orcidid: 0000-0002-3983-6919 surname: Bukar fullname: Bukar, Umar Ali organization: Centre for Intelligent Cloud Computing (CICC), Faculty of Information Science and Technology, Multimedia University, Bukit Beruang, Malacca, Malaysia |
BookMark | eNp9kUFv3CAQhVGVSE3T_IL0gNTzbg0YG46WlbaRovbg5owGPK7YbEwKuNH--7BxIkU9lMugp_keT7wP5GQOMxJyyaotY5X-0vX91TBsecXFVnClhKjekTPOGr0RUjQnb-7vyUVKu6ocVSTZnpGho8MS_-KBhokOB-v3tMsZ3B3twzJnjPcIaYmYqJ_p7TxifISi0gHnFCKFeaSdC0vK3tEfmB9DvEsfyekE-4QXL_Oc3H69-tV_39z8_HbddzcbV1c6b7RiUNtRT1wAatk0DluclLMjCuEkaKdtUwNjwBtd8xadkGyU2FYWtHZcnJPr1XcMsDMP0d9DPJgA3jwLIf42EEuwPRoLrZZKoeLoaubQtk7VUqsWuLW61sXr8-r1EMOfBVM2u7DEucQ3vPwob0u-44t63XIxpBRxMs5nyD7MOYLfG1aZYyVmrcQcKzEvlRRW_MO-Jv4_9WmlPCK-IZhUjdLiCacimcI |
CODEN | IAECCG |
CitedBy_id | crossref_primary_10_1007_s42979_024_03153_0 crossref_primary_10_1016_j_vehcom_2025_100899 crossref_primary_10_1109_ACCESS_2024_3353688 crossref_primary_10_1109_ACCESS_2024_3360488 crossref_primary_10_1142_S0219265923300015 crossref_primary_10_1007_s11277_024_11546_w crossref_primary_10_1049_cmu2_12734 crossref_primary_10_1002_sys_21806 |
Cites_doi | 10.1109/ACCESS.2018.2863945 10.1109/OCEANSE.2019.8867079 10.1109/TWC.2018.2886896 10.1007/3-540-45748-8_24 10.1002/9781119142119 10.1016/j.comnet.2009.07.013 10.1109/IEEECONF38699.2020.9389366 10.1109/WOWMOM.2006.27 10.1016/j.procs.2016.02.080 10.1109/ICSNS.2015.7292385 10.1155/2021/1444024 10.1145/986858.986868 10.1109/TVT.2019.2939179 10.1109/Trustcom/BigDataSE/ICESS.2017.351 10.1007/s11277-020-07175-8 10.1016/j.jnca.2018.07.006 10.1145/984622.984660 10.1109/MCOM.2015.7180508 10.1109/ICEEOT.2016.7754777 10.1109/JOE.2015.2469895 10.3390/s20185393 10.1109/NGCT.2015.7375150 10.1109/MWC.2011.5714022 10.1109/IEEECONF38699.2020.9389252 10.1145/1821748.1821819 10.1007/s11741-008-0113-2 10.1109/WIOPT.2006.1666499 10.1049/iet-rsn.2019.0477 10.1109/COMST.2018.2864127 10.1155/2015/896832 10.1109/COMST.2020.3048190 10.1109/CSCI51800.2020.00039 10.1109/JSAC.2011.110918 10.1109/MCOM.2010.5673085 10.1155/2014/398610 10.1109/WCNC.2008.444 10.1007/978-981-33-4673-4_37 10.1109/JSEN.2022.3142160 10.1109/ICCCNT51525.2021.9580054 10.1016/S1570-8705(03)00008-8 10.1109/DSN-W54100.2022.00028 10.1109/LCOMM.2018.2877317 10.1016/j.adhoc.2005.01.004 10.1109/ICEEICT53905.2021.9667810 10.1109/ICEEICT.2015.7307516 10.1098/rsta.2011.0214 10.1109/SoftCOM.2013.6671865 10.7717/peerj-cs.673 10.1109/ECACE.2019.8679165 10.1109/ISCC.2013.6754963 10.1109/OCEANS-Genova.2015.7271735 10.1109/MCOM.2015.7321972 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023 |
DBID | 97E ESBDL RIA RIE AAYXX CITATION 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D DOA |
DOI | 10.1109/ACCESS.2023.3288330 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE Xplore Open Access Journals IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Engineered Materials Abstracts METADEX Technology Research Database Materials Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional DOAJ Open Access Full Text |
DatabaseTitle | CrossRef Materials Research Database Engineered Materials Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace METADEX Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Materials Research Database |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 2169-3536 |
EndPage | 64543 |
ExternalDocumentID | oai_doaj_org_article_ba79588e82ec41ceb7c845987a2bb949 10_1109_ACCESS_2023_3288330 10158689 |
Genre | orig-research |
GrantInformation_xml | – fundername: Geran Putra Berimpak (GPB), UPM funderid: 10.13039/501100004530 |
GroupedDBID | 0R~ 4.4 5VS 6IK 97E AAJGR ABAZT ABVLG ACGFS ADBBV AGSQL ALMA_UNASSIGNED_HOLDINGS BCNDV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD ESBDL GROUPED_DOAJ IPLJI JAVBF KQ8 M43 M~E O9- OCL OK1 RIA RIE RNS AAYXX CITATION RIG 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c409t-981a4bd9f23ae9566ce7ef8cbde33c5a9c9b64a11a269427ec351d5e70ba99c23 |
IEDL.DBID | DOA |
ISSN | 2169-3536 |
IngestDate | Wed Aug 27 01:26:49 EDT 2025 Mon Jun 30 06:33:46 EDT 2025 Tue Jul 01 02:49:03 EDT 2025 Thu Apr 24 23:12:30 EDT 2025 Wed Aug 27 02:14:22 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Language | English |
License | https://creativecommons.org/licenses/by-nc-nd/4.0 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c409t-981a4bd9f23ae9566ce7ef8cbde33c5a9c9b64a11a269427ec351d5e70ba99c23 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0009-0002-0732-0261 0000-0003-2408-6956 0000-0002-4078-6066 0000-0002-3983-6919 |
OpenAccessLink | https://doaj.org/article/ba79588e82ec41ceb7c845987a2bb949 |
PQID | 2833275662 |
PQPubID | 4845423 |
PageCount | 26 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_ba79588e82ec41ceb7c845987a2bb949 proquest_journals_2833275662 crossref_primary_10_1109_ACCESS_2023_3288330 ieee_primary_10158689 crossref_citationtrail_10_1109_ACCESS_2023_3288330 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 20230000 2023-00-00 20230101 2023-01-01 |
PublicationDateYYYYMMDD | 2023-01-01 |
PublicationDate_xml | – year: 2023 text: 20230000 |
PublicationDecade | 2020 |
PublicationPlace | Piscataway |
PublicationPlace_xml | – name: Piscataway |
PublicationTitle | IEEE access |
PublicationTitleAbbrev | Access |
PublicationYear | 2023 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 ref57 abdulkader (ref14) 2018; 29 ref56 ref15 ref53 ref11 ref55 ref10 ref54 peach (ref2) 2013 ref17 ref16 ref19 ref18 ref51 ref50 ref46 ref45 ref48 ref47 ref42 ref41 ref44 ref43 ref49 ref8 ref7 ref9 ref4 ref3 ref6 ref5 ref40 liu (ref39) 2008 ref35 ref34 ref37 ref36 ref31 ref30 ref33 ref32 ref1 ref38 ref24 ref23 ref26 ref25 ref20 ref22 ref21 ref28 ref27 ref29 goyal (ref12) 2015 heidemann (ref52) 2005 |
References_xml | – ident: ref42 doi: 10.1109/ACCESS.2018.2863945 – ident: ref23 doi: 10.1109/OCEANSE.2019.8867079 – ident: ref43 doi: 10.1109/TWC.2018.2886896 – ident: ref6 doi: 10.1007/3-540-45748-8_24 – ident: ref46 doi: 10.1002/9781119142119 – ident: ref19 doi: 10.1016/j.comnet.2009.07.013 – ident: ref26 doi: 10.1109/IEEECONF38699.2020.9389366 – ident: ref18 doi: 10.1109/WOWMOM.2006.27 – ident: ref9 doi: 10.1016/j.procs.2016.02.080 – ident: ref17 doi: 10.1109/ICSNS.2015.7292385 – ident: ref48 doi: 10.1155/2021/1444024 – ident: ref57 doi: 10.1145/986858.986868 – ident: ref33 doi: 10.1109/TVT.2019.2939179 – ident: ref16 doi: 10.1109/Trustcom/BigDataSE/ICESS.2017.351 – ident: ref30 doi: 10.1007/s11277-020-07175-8 – year: 2005 ident: ref52 publication-title: Underwater sensor networking Research challenges and potential applications – ident: ref8 doi: 10.1016/j.jnca.2018.07.006 – ident: ref20 doi: 10.1145/984622.984660 – start-page: 1838 year: 2008 ident: ref39 article-title: Secure underwater acoustic communication based on a robust key generation scheme publication-title: Proc 9th Int Conf Signal Process – ident: ref5 doi: 10.1109/MCOM.2015.7180508 – ident: ref11 doi: 10.1109/ICEEOT.2016.7754777 – ident: ref45 doi: 10.1109/JOE.2015.2469895 – ident: ref47 doi: 10.3390/s20185393 – ident: ref29 doi: 10.1109/NGCT.2015.7375150 – ident: ref3 doi: 10.1109/MWC.2011.5714022 – volume: 29 start-page: 1 year: 2018 ident: ref14 article-title: A survey on sybil attack detection in vehicular ad hoc networks (VANET) publication-title: J Comput – ident: ref34 doi: 10.1109/IEEECONF38699.2020.9389252 – ident: ref54 doi: 10.1145/1821748.1821819 – ident: ref50 doi: 10.1007/s11741-008-0113-2 – ident: ref56 doi: 10.1109/WIOPT.2006.1666499 – ident: ref44 doi: 10.1049/iet-rsn.2019.0477 – ident: ref49 doi: 10.1109/COMST.2018.2864127 – ident: ref7 doi: 10.1155/2015/896832 – ident: ref51 doi: 10.1109/COMST.2020.3048190 – ident: ref22 doi: 10.1109/CSCI51800.2020.00039 – ident: ref38 doi: 10.1109/JSAC.2011.110918 – ident: ref4 doi: 10.1109/MCOM.2010.5673085 – ident: ref27 doi: 10.1155/2014/398610 – ident: ref55 doi: 10.1109/WCNC.2008.444 – ident: ref25 doi: 10.1007/978-981-33-4673-4_37 – ident: ref35 doi: 10.1109/JSEN.2022.3142160 – start-page: 1463 year: 2015 ident: ref12 article-title: Wormhole and sybil attack in WSN: A review publication-title: Proc 2nd Int Conf Comput Sustain Global Develop (INDIACom) – ident: ref28 doi: 10.1109/ICCCNT51525.2021.9580054 – ident: ref36 doi: 10.1016/S1570-8705(03)00008-8 – ident: ref10 doi: 10.1109/DSN-W54100.2022.00028 – ident: ref40 doi: 10.1109/LCOMM.2018.2877317 – ident: ref53 doi: 10.1016/j.adhoc.2005.01.004 – ident: ref24 doi: 10.1109/ICEEICT53905.2021.9667810 – ident: ref37 doi: 10.1109/ICEEICT.2015.7307516 – start-page: 31 year: 2013 ident: ref2 article-title: An overview of underwater sensor networks publication-title: Proc 9th Int Conf Wireless Mobile Commun (ICWMC) – ident: ref21 doi: 10.1098/rsta.2011.0214 – ident: ref15 doi: 10.1109/SoftCOM.2013.6671865 – ident: ref13 doi: 10.7717/peerj-cs.673 – ident: ref31 doi: 10.1109/ECACE.2019.8679165 – ident: ref41 doi: 10.1109/ISCC.2013.6754963 – ident: ref32 doi: 10.1109/OCEANS-Genova.2015.7271735 – ident: ref1 doi: 10.1109/MCOM.2015.7321972 |
SSID | ssj0000816957 |
Score | 2.333144 |
Snippet | Underwater sensor and acoustic networks have several unique applications including water quality and ocean life monitoring, as well as ocean navigation and... |
SourceID | doaj proquest crossref ieee |
SourceType | Open Website Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 64518 |
SubjectTerms | Acoustics Communication Cybersecurity Security Sensors Surveys Sybil attacks trust management UASN Underwater acoustics Underwater communication Underwater detectors UWSN Vehicular ad hoc networks Water quality Wireless communication Wireless communications Wireless sensor networks |
SummonAdditionalLinks | – databaseName: IEEE Electronic Library (IEL) dbid: RIE link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT9wwELYKJ3oohVJ1KSAfemzS2I5j-7hdgRBS97JF4hb5MZEQVVLtZqnor69fu4JWRdyiyFYmGY89M5n5PoQ-OUMohYDcKpwPUFjVFYp3srC80j6Adpw2oRv527y5vK6vbvhNblaPvTAAEIvPoAyX8V--G-w6pMq8hRMuG6l20I6P3FKz1jahEhgkFBcZWYhU6st0NvMvUQaC8JJFVt3qyekTQfozq8o_W3E8Xy720XwjWSoruSvXoynt779AG18s-lv0JnuaeJqWxgF6Bf0hev0If_AdWkzxYr28hwc8dHjxYG798HHU9g6HVvWwaacM4grf9jgyJP3yrukSL3zsOyyx7h2e2iHygeF5qidfHaHri_Pvs8sisywU1sd2Y6Ek0bVxqqNMg4-WGgsCOmmNA8Ys18oq09SaEB2aXqkAyzhxHERltFKWsvdotx96-ICwbBQFoNBZLWvpLVvoeOAZRqAWzk0Q3Xz91mYI8sCE8aONoUil2qSyNqiszSqboM_bST8TAsfzw78GtW6HBvjseMOro83W6D0EobiUICnYmlgwwsqaKy8vNUbVaoKOggofPS9pb4JONqukzba-ar2DxgKIfkOP_zPtI9oLIqbMzQnaHZdrOPW-zGjO4hr-A23677E priority: 102 providerName: IEEE |
Title | A Survey of Sybil Attack Countermeasures in Underwater Sensor and Acoustic Networks |
URI | https://ieeexplore.ieee.org/document/10158689 https://www.proquest.com/docview/2833275662 https://doaj.org/article/ba79588e82ec41ceb7c845987a2bb949 |
Volume | 11 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1NSwMxEA3iSQ_iR8VqlRw8urpJNpvkWIsigl5qwVvIxyyIspV2q_Tfm2RXqQh68RqyZDOZZOaFzHsInXpLKIXI3Cp8ACgsrzLFK5k5npsAoD2nZaxGvrsvbybF7SN_XJH6im_CWnrg1nAX1gjFpQRJwRXEgRVOFjwgZUOtVUUq3QsxbwVMpTNYklJx0dEMkVxdDEejMKPzqBZ-zpLEbv4tFCXG_k5i5ce5nILN9Tba6rJEPGz_bgetQb2LNle4A_fQeIjHi9kbLPG0wuOlfQrdm8a4ZxzLzOOB297-zfFTjZO60XtIK2d4HHDrdIZN7fHQTZOWF75v34LPe2hyffUwusk6hYTMBVzWZEoSU1ivKsoMBKRTOhBQSWc9MOa4UU7ZsjCEmFiwSgU4xonnIHJrlHKU7aP1elrDAcKyVBSAQuWMLGTYlcKkYGUZgUJ430f001jadfThUcXiRScYkSvdWlhHC-vOwn109vXRa8ue8Xv3y7gKX10j9XVqCA6hO4fQfzlEH_XiGq6MR7gsZWgffC6q7vbpXIfkikUC_JIe_sfYR2gjzqe9ohmg9Wa2gOOQtDT2JPnnSaov_ACZb-be |
linkProvider | Directory of Open Access Journals |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9QwELagHKAHnkVdKOADRxJiO47t47KiWqDdy7ZSb5YfE6lqlaDdLKj8emzHuyogELcospVJxuN5xPN9CL31llAKEblV-JCgsKotFG9l4XhlQgLtOW1iN_Lpopmf158v-EVuVk-9MACQDp9BGS_Tv3zfu00slQULJ1w2Ut1F94Lj52Rs19qVVCKHhOIiYwuRSr2fzmbhNcpIEV6yxKtb_eJ_Ekx_5lX5YzNOHub4EVpsZRsPllyVm8GW7sdvsI3_Lfxj9DDHmng6Lo4n6A50T9H-LQTCZ2g5xcvN6hvc4L7Fyxt7GYYPg3FXODarx217rCGu8WWHE0fS9xCcrvAyZL_9CpvO46nrEyMYXownytcH6Pz449lsXmSehcKF7G4olCSmtl61lBkI-VLjQEArnfXAmONGOWWb2hBiYtsrFeAYJ56DqKxRylH2HO11fQeHCMtGUQAKrTOylsG2hUkuzzICtfB-guj262uXQcgjF8a1TslIpfSoMh1VprPKJujdbtLXEYPj38M_RLXuhkYA7XQjqENnewwxglBcSpAUXE0cWOFkzVWQl1qrajVBB1GFt543am-CjrarRGdrX-sQorEIo9_QF3-Z9gbdn5-dnuiTT4svL9GDKO5YxzlCe8NqA69CZDPY12k9_wQS__L6 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Survey+of+Sybil+Attack+Countermeasures+in+Underwater+Sensor+and+Acoustic+Networks&rft.jtitle=IEEE+access&rft.au=Zukarnain%2C+Zuriati+Ahmad&rft.au=Amodu%2C+Oluwatosin+Ahmed&rft.au=Wenting%2C+Cui&rft.au=Bukar%2C+Umar+Ali&rft.date=2023&rft.pub=IEEE&rft.eissn=2169-3536&rft.volume=11&rft.spage=64518&rft.epage=64543&rft_id=info:doi/10.1109%2FACCESS.2023.3288330&rft.externalDocID=10158689 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon |