Research Advances on Security Problems of Underwater Sensor Networks

Article Preview

Abstract:

Research on underwater sensor networks (UWSN) is one of the hot research topics at present. For characteristics of UWSN, such as the severe environment, the huge propagation delay, and the limited link capacity, it suffers more security threats than conventional networks. In this paper, weakness and desired properties of UWSN are discussed, and several key aspects of the security and energy issue of UWSN are investigated.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 317-319)

Pages:

1002-1006

Citation:

Online since:

August 2011

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Mark Chaffey, Larry Bird, Jon Erickson, et al. MBARI's buoy based seafloor observatory design[C]. MTTS/IEEE Techno-Ocean'04[C], 9-12 Nov.2004, 4:1975-1984.

DOI: 10.1109/oceans.2004.1406447

Google Scholar

[2] Sun Gui-zhi, Sang En-fang. An energy-efficient routing protocol for underwater acoustic sensor network[J]. Technical Acoustics, 2007(1):134-136.

Google Scholar

[3] Liu Shao-wei, Luo Dan-yan, Xiang Lin, Zuo De-cheng. Energy-Balanced Topology Control Algorithm of Wireless Sensor Network[J]. Journal of University of Electronic Science and Technology of China, 2010(4):89-93.

Google Scholar

[4] Wang Yan-mei. Research on Topology Control Algorithm in Wireless Sensor Networks[D]. Xi Dian University, 2009.

Google Scholar

[5] Rice J A, Creber B, et al. Evolution of Seaweb Underwater Acoustic Networking[A]. Proceedings of Oceans Conference Record (IEEE)[C].2000:2007-2017.

Google Scholar

[6] Shi E, Perrig A. Designing Secure Sensor Networks[J]. IEEE Wireless Communication Magazine, 2004(12):38-43.

DOI: 10.1109/mwc.2004.1368895

Google Scholar

[7] Wills J, Ye Wei, Heidemann J. Low-power acoustic modem for dense underwater sensor networks[C] Proceedings of the 1st ACM Int Workshop on Under Water Networks. New York:ACM,2006:79-85

DOI: 10.1145/1161039.1161055

Google Scholar

[8] Gong Hai-gang, et al. Distributed Energy Efficient Data Gathering in Wireless Sensor Networks[J]. Acta Electronica Sinica, 2005(8).

Google Scholar

[9] Zhu Sencun. LEAP : efficient security mechanisms for large-scale distributed sensor networks[C]. In the proceedings of the 10th ACM conference on computer and communications security ,Oct . 2003 :62272.

DOI: 10.1145/948109.948120

Google Scholar

[10] J. Kong, Z. Ji, W. Wang, M. Gerla, R. Bagrodia, and B. Bhar-gava. Low-cost Attacks against Packet Delivery, Localization and Synchronization Services in Under-Water Sensor Networks. In Fourth ACM Workshop on Wireless Security (WiSe), 2005.

DOI: 10.1145/1080793.1080808

Google Scholar

[11] I. Khalil, S. Bagchi, and N. B. Shroff, "LITEWORP: A Lightweight Countermeasure for the Wormhole attack in multihop wireless network, in International Conference on Dependable Systems and Networks(DSN), 2005.

DOI: 10.1109/dsn.2005.58

Google Scholar

[12] L. Hu and D. Evans. Using Directional Antennas to Prevent Wormhole Attacks. In Network and Distributed System Security Symposium (NDSS), 2004.

Google Scholar

[13] Newsome J . The sybil attack in sensor networks: analysis & defense[C] . Proceedings of the third international symposium on information proceeding in sensor networks. ACM press ,2004 :2592268.

DOI: 10.1145/984622.984660

Google Scholar

[14] Huang Zhen, Ye Ding-fen. Efficient key management scheme in wireless sensor networks[J]. Computer Engineering and Design, 2009, 30(1):25-28.

Google Scholar

[15] Jing Deng , Richard Han and Shivakant Mishra. INSENS : intrusion-tolerant routing in wireless sensor networks [R] . TR CU2CS2939202 , University of Colorado.

DOI: 10.1016/j.comcom.2005.05.018

Google Scholar

[16] Liu Qing, Wang Pei-kang. Secure and Energy-Efficient Clustered Routing Protocol for Wireless Sensor Networks [J]. Computer Simulation, 2009(4).

Google Scholar

[17] M. Demirbas and Y. Song. An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor Networks. In Proc. of International Workshop on Advanced Experimental Activities on Wireless Networks and Systems, June 2006.

DOI: 10.1109/wowmom.2006.27

Google Scholar