Security Issues in Underwater Sensor Networks: Attacks and Defenses

Article Preview

Abstract:

Underwater Sensor Network (UWSN) is a powerful technique for aquatic applications. Although the international researches on this topic are quite prosperous, it is still in its early stage of development. UWSN is vulnerable to various kinds of attacks because it is usually deployed in hostile environments. This paper systematically summarizes and analyzes the existing security attacks and defensive mechanisms of the UWSN. We expect it can offer a theoretical reference for the establishment of the UWSN security system.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2689-2698

Citation:

Online since:

September 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Junhong Cui, Jiejun Kong, M. Gerla and Shengli Zhou, The challenges of building mobile underwater wireless networks for aquatic applications, Network, vol. 20, pp.12-18, May. (2006).

DOI: 10.1109/mnet.2006.1637927

Google Scholar

[2] W. Broecker and T.H. Peng, Tracers in the sea, Eldigio Press, Lamont Doherty Earth Observatory of Columbia University, Palisades, NY, page 689, (1982).

Google Scholar

[3] Xiangqian Chen, Kia Makki, Kang Yen and N. Pissinou, Sensor network security: a survey, Communications Surveys & Tutorials, vol. 11, pp.52-73, Jun. (2009).

DOI: 10.1109/surv.2009.090205

Google Scholar

[4] S. Azou, C. Pistre and G. Burel, A Chaotic Direct-Sequence Spread-Spectrum System for Underwater Communication, " in Proc. Oceans, 02, Biloxi, Mississippi, 2002, pp.2409-2415.

DOI: 10.1109/oceans.2002.1192004

Google Scholar

[5] A. D. Wood and J. A. Stankovic, A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks, chapter in Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, M. Ilyas and I. Mahgoub, Eds., CRC Press, (2004).

DOI: 10.1201/9780203489635.ch32

Google Scholar

[6] S. Chouhan, R. Bose and M. Balakrishnan, Integrated energy analysis of error correcting codes and modulation for energy efficient wireless sensor nodes, Wireless Communications, vol. 8, pp.5348-5355, (2009).

DOI: 10.1109/twc.2009.090279

Google Scholar

[7] Yangze Dong and Pingxiang Liu, Security analysis on underwater acoustic networks, in Proc. OCEANS, Yeosu, 2012, p.1–4.

DOI: 10.1109/oceans-yeosu.2012.6263360

Google Scholar

[8] Yun Zhou, Yuguang Fang and Yanchao Zhang, SECURING WIRELESS SENSOR NETWORKS: A SURVEY, Communications Surveys & Tutorials, vol. 10, pp.6-28, Sept. (2008).

DOI: 10.1109/comst.2008.4625802

Google Scholar

[9] I. F. Akyildiz, D. Pompili, and T. Melodia, Underwater Acoustic Sensor Networks: Research Challenges, AdHoc Network, vol. 3, no. 3, Mar. (2005).

DOI: 10.1016/j.adhoc.2005.01.004

Google Scholar

[10] C. Karlof and D. Wagner, Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures, in Proc. First IEEE International Workshop on Sensor Network Protocols and Applications, 2003, p.113–127.

DOI: 10.1109/snpa.2003.1203362

Google Scholar

[11] Hong-Yu Hu, Hui-Mei Lu, Yuan-Da Cao and Si-Min Rao, Dynamic hierarchical multicast routing with delaybandwidth constraints, Chinese Journal of Computers. vol. 32, pp.564-575, Mar. (2009).

Google Scholar

[12] Yuh-Shyan Chen and Yun-Wei Lin, Mobicast Routing Protocol for Underwater Sensor Networks, Sensors Journal, vol. 13, p.737–749, (2013).

DOI: 10.1109/jsen.2012.2226877

Google Scholar

[13] J. Kong, Z. Ji, W. Wang, M. Gerla, R. Bagrodia, and B. Bhargava, Low-cost Attacks against Packet Delivery, Localization and Synchronization Services in Under-Water Sensor Networks, in Proc. WiSe, (2005).

DOI: 10.1145/1080793.1080808

Google Scholar

[14] Weichao Wang, Jiejun Kong, Bharat Bhargava, and Mario Gerla, Visualization of wormholes in underwater sensor networks: a distributed approach, Security and Networks, Vol. 3, pp.10-23, (2008).

DOI: 10.1504/ijsn.2008.016198

Google Scholar

[15] R. Zhang and Y. Zhang, Wormhole-Resilient Secure Neighbor Discovery in Underwater Acoustic Networks, in Proc. INFOCOM, San Diego, 2010, pp.1-9.

DOI: 10.1109/infcom.2010.5462093

Google Scholar

[16] Shuai Wang, Secure Localization Algorithm for Underwater Wireless Sensor Networks, China New Telecommunications, pp.69-73, February (2008).

Google Scholar

[17] Song Zhang, Deshi Li and Jian Chen, A Link-State Based Adaptive Feedback Routing for Underwater Acoustic Sensor Networks, Sensors Journal, vol. 13, p.4402–4412, (2013).

DOI: 10.1109/jsen.2013.2269796

Google Scholar

[18] J. Deng, R. Han, and S. Mishra, Actuation sensor with adaptive routing and QOS aware checkpoint arrangement on Wireless Multimedia Sensor Network, in Proc. ICRTIT, Chennai, Tamil Nadu, 2011, pp.444-449.

DOI: 10.1109/icrtit.2011.5972331

Google Scholar

[19] J. Newsome, E. Shi, D. Song and A. Perrig, The Sybil Attack in Sensor Networks: Analysis and Defenses, in Proc. IPSN, 2004, pp.259-268.

DOI: 10.1145/984622.984660

Google Scholar

[20] T. Aura, P. Nikander, and J. Leiwo, DOS-Resistant Authentication with Client Puzzles, in Proc. Security Protocols Workshop, New York, 2000, pp.170-177.

DOI: 10.1007/3-540-44810-1_22

Google Scholar

[21] J. G. Proakis, E. M. Sozer, J. A. Rice, and M. Stojanovic, Shallow Water Acoustic Networks, Communications, vol. 39, pp.114-119, Nov. (2001).

DOI: 10.1109/35.965368

Google Scholar

[22] S. Choochaisri, S. Aurburananont, A. Saowwapak-adisak, C. Intanagonwiwat, DeVise: A tool for visualizing and validating desynchronization protocols for multi-hop wireless sensor networks, in Proc. ECTI-CON, Phetchaburi, 2012, pp.1-4.

DOI: 10.1109/ecticon.2012.6254332

Google Scholar

[23] David R. Raymond and S.F. Midkiff, Clustered Adaptive Rate Limiting: Defeating Denial-of-Sleep Attacks in Wireless Sensor Networks, in Proc. MILCOM, Orlando, 2007, p.1–7.

DOI: 10.1109/milcom.2007.4455251

Google Scholar

[24] A. Hagedorn, D. Starobinski, A. Trachtenberg, Rateless Deluge: Over-the-Air Programming of Wireless Sensor Networks Using Random Linear Codes, in Proc. IPSN, St. Louis, 2008, p.457–466.

DOI: 10.1109/ipsn.2008.9

Google Scholar