Challenges, Threats, Security Issues and New Trends of Underwater Wireless Sensor Networks
Abstract
:1. Introduction
- In this article, the special particularities and constraints of UWSNs and underwater acoustic channels are presented and discussed in detail. Based on the analyses, we conclude that UWSNs are vulnerable to various threats and attacks and security issues should be discussed.
- Threats and attacks in UWSNs are classified and discussed in this article. In addition, denial of service (DoS) attacks and feasible countermeasures in each layer are analyzed in detail.
- Compared with WSNs, some especial security requirements of UWSNs are discussed and existing security mechanisms and specific protocols are presented.
2. Particularities and Constraints
2.1. Extremely Limited Resources
2.2. Unreliable Communication Channel
2.2.1. Long and Variable Propagation Delay
2.2.2. Limited Bandwidth and Low Data Rates
2.2.3. Ambient Noise
2.3. Transmission Loss
2.4. Multipath and Doppler Effect
2.5. Transmission Error
2.6. Dynamic Network Topology
2.7. Insecure Working Environment
2.8. Physical Vulnerability
3. Threats and Challenges in Underwater Wireless Sensor Networks (UWSNs)
3.1. Passive Attacks
3.2. Active Attacks
- Node compromise attacks: a malicious attacker can tamper with underwater sensor nodes physically. As discussed in Section 2, in some specific fields of applications, underwater sensor nodes may be deployed in unattended and even worse hostile sea regions. Moreover, the network may consist of tens or hundreds of nodes deployed in large scales, which means that it is unable to ensure the safety of all nodes. An attacker can locate the nodes by monitoring the intensity of the acoustic signal and capture them. Worse, if there are no hardware hack-proof technique or other security mechanism, the attacker may easily crack and compromise them to read privacy data (e.g., secret key, encryption algorithm, trust value) and modify these data from internal memory. Moreover, the compromised node may be injected into the network as a legitimate node to monitor or cause continuous attacks. Therefore, in the vast majority of cases, the node compromise attacks are combined with other active attacks to cause more severe damage to disturb communication and cooperation between sensor nodes. To prevent network from these attacks, hardware hack-proof techniques, re-configuring, and trust management mechanisms should be designed and used for UWSNs.
- Repudiation attacks: in repudiation attacks, malicious nodes deny having any involvement in particular action or communication with other nodes. This refers to the denial by a node involved in a communication of having participated in all or part of the communication, regardless whether that communication is malicious or not.
- Packet-oriented attacks: in packet-oriented attacks, the malicious adversary lunches attacks that aiming at disrupt packet transmission or destroy the data of the packet. There are some common active attacks including: interception attack, modification attack, and injection attack. An interception attack is to capture packets from an acoustic channel by intercepting. Moreover, the attacker can read and modify the content of the intercepted packets which is called a modification attack. An injection attack is to inject useless or harmful packets into the network to consume nodes’ energy or disrupt the network.
- Protocol-oriented attacks: the malicious adversary launches attacks that aiming at disrupt the function of some specific protocols. The main categories of this kind of attacks are: routing protocol attacks and media access control (MAC) protocol attacks. Routing protocol attacks can cause packets unable to be transferred to the destination node, and even disrupt the operation of the network. These types of attacks are mounted on the routing protocols, such as routing table overflow, routing table poisoning, packet replication, and rushing attacks. Through these malicious behaviors, attackers can attract packets and analyze or even drop packets at its will. MAC protocol attacks aimed at disrupting the mechanism that control nodes access to channel. Malicious attackers can continuously occupy the channel to deprive legitimate nodes’ chances of sending packets. Moreover, for the request to send/clear to send (RTS/CTS) handshake MAC protocol, continuously sending RTS packets would consume nodes’ battery which is a cheap and easy way to lunch attacks. To defend against these attacks, the feasible solution is using encryption, authentication and trust management mechanisms suitable for UWSNs.
- DoS attacks: DoS attacks attempt to make resources and services unavailable to the legitimate nodes. To achieve this goal, the attacker tried to prevent legitimate nodes to access services offered by the network. DoS attacks can be passive or active, and can be carried out in many different ways. Combined with other passive or active attacks, it is more difficult to detect and defend against these attacks.
3.3. DoS Attacks
3.3.1. Physical Layer
Eavesdropping Attack
Jamming Attack
3.3.2. Datalink Layer
Jamming Attack
Collision Attack
Exhaustion Attack
Denial-of-Sleep Attack
Unfairness
3.3.3. Network Layer
Replay Attack
Selective Forwarding Attack
Neglect and Greed
Misdirection Attack
Black Hole/Gray Hole Attack
Sinkhole Attack
Wormhole Attack
Sybil Attack
Hello Flooding Attack
Homing Attack
3.3.4. Transport Layer
Desynchronization Attack
Synchronization Flooding Attack
4. Security Issues of UWSNs
4.1. Security Requirements
4.2. Security Mechanisms
4.2.1. Key Management
4.2.2. Intrusion Detection
4.2.3. Trust Management
4.2.4. Localization Security
4.2.5. Synchronization Security
4.2.6. Routing Security
4.3. Security Systems
5. Discussion and Future Research Topics
6. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Cui, J.H.; Kong, J.; Gerla, M.; Zhou, S. Challenges: Building scalable and distributed Underwater Wireless Sensor Networks (UWSNs) for aquatic applications. Channels 2005, 45, 22–35. [Google Scholar]
- Akyildiz, I.F.; Pompili, D.; Melodia, T. Underwater acoustic sensor networks: Research challenges. Ad Hoc Netw. 2005, 3, 257–279. [Google Scholar] [CrossRef]
- Li, X.; Fang, S.; Zhang, Y. The study on clustering algorithm of the underwater acoustic sensor networks. In Proceedings of the 14th IEEE International Conference on Mechatronics and Machine Vision in Practice (M2VIP 2007), Xiamen, China, 4–6 December 2007; pp. 78–81. [Google Scholar]
- Wang, P.; Li, C.; Zheng, J. Distributed minimum-cost clustering protocol for underwater sensor networks (UWSNs). In Proceedings of the IEEE International Conference on Communications (ICC’07), Glasgow, UK, 24–28 June 2007; pp. 3510–3515. [Google Scholar]
- McGlynn, M.J.; Borbash, S.A. Birthday protocols for low energy deployment and flexible neighbor discovery in ad hoc wireless networks. In Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking & Computing, Long Beach, CA, USA, 4–5 October 2001; pp. 137–145. [Google Scholar]
- Heidemann, J.; Ye, W.; Wills, J.; Syed, A.; Li, Y. Research challenges and applications for underwater sensor networking. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC 2006), Las Vegas, NV, USA, 3–6 April 2006; Volume 1, pp. 228–235. [Google Scholar]
- Lopez, J.; Roman, R.; Alcaraz, C. Analysis of security threats, requirements, technologies and standards in wireless sensor networks. In Foundations of Security Analysis and Design V; Springer: Berlin/Heidelberg, Germany, 2009; pp. 289–338. [Google Scholar]
- Perrig, A.; Stankovic, J.; Wagner, D. Security in wireless sensor networks. Commun. ACM 2004, 47, 53–57. [Google Scholar] [CrossRef]
- Etter, P.C. Underwater Acoustic Modeling: Principles, Techniques and Application; Elsevier Applied Science: London, UK; New York, NY, USA, 1991. [Google Scholar]
- Burrowes, G.E.; Khan, J.Y. Investigation of a short-range underwater acoustic communication channel for MAC protocol design. In Proceedings of the 2010 4th IEEE International Conference on Signal Processing and Communication Systems (ICSPCS), Gold Coast, Australia, 13–15 December 2010; pp. 1–8. [Google Scholar]
- Stojanovic, M. On the relationship between capacity and distance in an underwater acoustic communication channel. ACM SIGMOBILE Mob. Comput. Commun. Rev. 2007, 11, 34–43. [Google Scholar] [CrossRef]
- Brekhovskikh, L.M.; Lysanov, Y.P.; Lysanov, J.P. Fundamentals of Ocean Acoustics; Springer Science & Business Media: Berlin, Germany, 2003. [Google Scholar]
- Stojanovic, M. Underwater acoustic communications: Design considerations on the physical layer. In Proceedings of the IEEE Fifth Annual Conference on Wireless on Demand Network Systems and Services (WONS 2008), Garmisch-Partenkirchen, Germany, 23–25 January 2008; pp. 1–10. [Google Scholar]
- Wood, A.D.; Stankovic, J.A. Denial of service in sensor networks. Computer 2002, 35, 54–62. [Google Scholar] [CrossRef] [Green Version]
- Raymond, D.R.; Midkiff, S.F. Denial-of-service in wireless sensor networks: Attacks and defenses. IEEE Pervasive Comput. 2008, 7, 74–81. [Google Scholar] [CrossRef]
- Yang, G.; Dai, L.E.; Si, G.N.; Wang, S.X.; Wang, S.Q. Challenges and Security Issues in Underwater Wireless Sensor Networks. In Proceedings of the International Conference on Identification, Information & Knowledge in the Internet of Things, Beijing, China, 19–21 October 2018. in press. [Google Scholar]
- Ahuja, H.; Gupta, E.J. Analysis of Malicious Data in Underwater Sensor Network. Analysis 2012, 2, 967–971. [Google Scholar]
- Wang, Q.; Dai, H.N.; Li, X.; Wang, H.; Xiao, H. On modeling eavesdropping attacks in underwater acoustic sensor networks. Sensors 2016, 16, 721. [Google Scholar] [CrossRef] [PubMed]
- Zuba, M.E. Denial-of-Service Attacks and Countermeasures in Underwater Acoustic Networks. Ph.D. Thesis, University of Connecticut, Storrs, CT, USA, 2014. [Google Scholar]
- Lanbo, L.; Shengli, Z.; Jun-Hong, C. Prospects and problems of wireless communication for underwater sensor networks. Wirel. Commun. Mob. Comput. 2008, 8, 977–994. [Google Scholar] [CrossRef] [Green Version]
- Wang, Z.; Zhen, F.; Zhang, S.; Liu, M.; Zhang, Q. Jamming-resilient algorithm for underwater cognitive acoustic networks. Int. J. Distrib. Sens. Netw. 2017, 13. [Google Scholar] [CrossRef]
- Goetz, M.; Azad, S.; Casari, P.; Nissen, I.; Zorzi, M. Jamming-Resistant Multi-path Routing for Reliable Intruder Detection in Underwater Networks. In Proceedings of the Sixth ACM International Workshop on Underwater Networks, Seattle, WA, USA, 1–2 December 2011. [Google Scholar]
- Khatua, M.; Misra, S. Exploiting partial-packet information for reactive jamming detection: Studies in UWSN environment. In Proceedings of the International Conference on Distributed Computing and Networking, Mumbai, India, 3–6 January 2013; Springer: Berlin/Heidelberg, Germany, 2013; pp. 118–132. [Google Scholar]
- Misra, S.; Dash, S.; Khatua, M.; Vasilakos, A.V.; Obaidat, M.S. Jamming in underwater sensor networks: Detection and mitigation. IET Commun. 2012, 6, 2178–2188. [Google Scholar] [CrossRef]
- Pu, C.; Lim, S.; Jung, B.; Min, M. Mitigating stealthy collision attack in energy harvesting motivated networks. In Proceedings of the 2017 IEEE Military Communications Conference (MILCOM 2017), Baltimore, MD, USA, 23–25 October 2017; pp. 539–544. [Google Scholar]
- Kamalesh, S.; Kumar, P.G. Fuzzy Based Secure Intrusion Detection System for Authentication in Wireless Sensor Networks. J. Comput. Theor. Nanosci. 2017, 14, 2465–2472. [Google Scholar] [CrossRef]
- Stajano, F.; Anderson, R.J. The resurrecting duckling. In Proceedings of the 7th International Workshop on Security Protocols, Cambridge, UK, 19–21 April 1999. [Google Scholar]
- Ibragimov, M.; Lee, J.H.; Kalyani, M.; Namgung, J.I.; Park, S.H.; Yi, O.; Lim, Y.K. CCM-UW security modes for low-band underwater acoustic sensor networks. Wirel. Pers. Commun. 2016, 89, 479–499. [Google Scholar] [CrossRef]
- Xu, M.; Liu, G.; Guan, J. Towards a secure medium access control protocol for cluster-based underwater wireless sensor networks. Int. J. Distrib. Sens. Netw. 2015, 11, 325474. [Google Scholar] [CrossRef]
- Pandarinath, P. Secure localization with defense against selective forwarding attacks in wireless sensor networks. In Proceedings of the 2011 IEEE 3rd International Conference on Electronics Computer Technology (ICECT), Kanyakumari, India, 8–10 April 2011; Volume 5, pp. 112–117. [Google Scholar]
- Zhou, P.; Jiang, S.; Irissappane, A.; Zhang, J.; Zhou, J.; Teo, J.C.M. Toward energy-efficient trust system through watchdog optimization for WSNs. IEEE Trans. Inf. Forensics Secur. 2015, 10, 613–625. [Google Scholar] [CrossRef]
- Ahmed, M.R.; Aseeri, M.; Kaiser, M.S.; Zenia, N.Z.; Chowdhury, Z.I. A novel algorithm for malicious attack detection in uwsn. In Proceedings of the 2015 IEEE International Conference on Electrical Engineering and Information Communication Technology (ICEEICT), Dhaka, Bangladesh, 21–23 May 2015; pp. 1–6. [Google Scholar]
- Lim, S.; Huie, L. Hop-by-Hop cooperative detection of selective forwarding attacks in energy harvesting wireless sensor networks. In Proceedings of the 2015 IEEE International Conference on Computing, Networking and Communications (ICNC), Garden Grove, CA, USA, 16–19 February 2015; pp. 315–319. [Google Scholar]
- Jiang, J.; Han, G.; Zhu, C.; Chan, S.; Rodrigues, J.J. A trust cloud model for underwater wireless sensor networks. IEEE Commun. Mag. 2017, 55, 110–116. [Google Scholar] [CrossRef]
- Prasan, U.D.; Murugappan, S.A. Combinatorial Multi-Objective Trust Model for Efficient and Secured Routing in UWSN. Int. J. Eng. Trends Technol. 2012, 22, 259–264. [Google Scholar] [CrossRef]
- Ioannou, C.; Vassiliou, V. The Impact of Network Layer Attacks in Wireless Sensor Networks. In Proceedings of the 2016 IEEE International Workshop on Secure Internet of Things (SIoT), Heraklion, Greece, 26–30 September 2016; pp. 20–28. [Google Scholar]
- Saini, M.; Kumar, R. To Propose a Novel Technique for Detection and Isolation of Misdirection Attack in Wireless Sensor Network. Indian J. Sci. Technol. 2016, 9. [Google Scholar] [CrossRef] [Green Version]
- Dongare, S.P.; Mangrulkar, R.S. Implementing energy efficient technique for defense against Gray-Hole and Black-Hole attacks in wireless sensor networks. In Proceedings of the 2015 IEEE International Conference on Advances in Computer Engineering and Applications (ICACEA), Ghaziabad, India, 19–20 March 2015; pp. 167–173. [Google Scholar]
- Sakharkar, S.M.; Mangrulkar, R.S.; Atique, M. A survey: A secure routing method for detecting false reports and gray-hole attacks along with Elliptic Curve Cryptography in wireless sensor networks. In Proceedings of the 2014 IEEE Students’ Conference on Electrical, Electronics and Computer Science (SCEECS), Bhopal, India, 1–2 March 2014; pp. 1–5. [Google Scholar]
- Dongare, S.P.; Mangrulkar, R.S. Optimal cluster head selection based energy efficient technique for defending against gray hole and black hole attacks in wireless sensor networks. Procedia Comput. Sci. 2016, 78, 423–430. [Google Scholar] [CrossRef]
- Taylor, V.F.; Fokum, D.T. Mitigating black hole attacks in wireless sensor networks using node-resident expert systems. In Proceedings of the IEEE Wireless Telecommunications Symposium (WTS), Washington, DC, USA, 9–11 April 2014; pp. 1–7. [Google Scholar]
- Guerroumi, M.; Derhab, A.; Saleem, K. Intrusion detection system against sink hole attack in wireless sensor networks with mobile sink. In Proceedings of the 2015 12th IEEE International Conference on Information Technology-New Generations (ITNG), Las Vegas, NV, USA, 13–15 April 2015; pp. 307–313. [Google Scholar]
- Coutinho, R.W.L.; Boukerche, A.; Vieira, L.F.M.; Loureiro, A.A.F. Geographic and opportunistic routing for underwater sensor networks. IEEE Trans. Comput. 2016, 65, 548–561. [Google Scholar] [CrossRef]
- Souiki, S.; Feham, M.; Feham, M.; Labraoui, N. Geographic routing protocols for underwater wireless sensor networks: A survey. arXiv, 2014; arXiv:1403.3779. [Google Scholar]
- El-Rabaie, S.; Nabil, D.; Mahmoud, R.; Alsharqawy, M.A. Underwater wireless sensor networks (UWSN), architecture, routing protocols, simulation and modeling tools, localization, security issues and some novel trends. Netw. Commun. Eng. 2015, 7, 335–354. [Google Scholar]
- Xiao, L.; Zhu, Y. Modeling the wormhole attack in underwater sensor network. In Proceedings of the 2012 8th IEEE International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM), Shanghai, China, 21–23 September 2012; pp. 1–4. [Google Scholar]
- Liu, Z.; Deng, X.; Li, J. A secure localization algorithm based on reputation against wormhole attack in UWSNS. In Proceedings of the 2017 IEEE International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS), Xiamen, China, 6–9 November 2017; pp. 695–700. [Google Scholar]
- Kong, J.; Ji, Z.; Wang, W.; Gerla, M.; Bagrodia, R. On Wormhole Attacks in Under-Water Sensor Networks: A Two-Tier Localization Approach; Technical Report; UCLA Computer Science Department: Los Angeles, CA, USA, 2004. [Google Scholar]
- Dargahi, T.; Javadi HH, S.; Shafiei, H. Securing Underwater Sensor Networks against Routing Attacks. Wirel. Pers. Commun. 2017, 96, 2585–2602. [Google Scholar] [CrossRef]
- Wang, W.; Kong, J.; Bhargava, B.; Gerla, M.; Bagrodia, R.; Bhargava, B. Visualisation of wormholes in underwater sensor networks: A distributed approach. Int. J. Secur. Netw. 2008, 3, 10–23. [Google Scholar] [CrossRef]
- Demirbas, M.; Song, Y. An RSSI-based scheme for sybil attack detection in wireless sensor networks. In Proceedings of the 2006 International Symposium on World of Wireless, Mobile and Multimedia Networks, Washington, DC, USA, 26–29 January 2006; pp. 564–570. [Google Scholar]
- Yavuz, F.; Zhao, J.; Yagan, O.; Gligor, V. On secure and reliable communications in wireless sensor networks: Towards k-connectivity under a random pairwise key predistribution scheme. In Proceedings of the 2014 IEEE International Symposium on Information Theory (ISIT), Honolulu, HI, USA, 29 June–4 July 2014; pp. 2381–2385. [Google Scholar]
- Li, X.; Han, G.; Qian, A.; Shu, L.; Rodrigues, J. Detecting Sybil attack based on state information in underwater wireless sensor networks. In Proceedings of the 2013 21st IEEE International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Primosten, Croatia, 18–20 September 2013; pp. 1–5. [Google Scholar]
- Coutinho, R.W.L.; Boukerche, A.; Vieira, L.F.M.; Shu, L.; Rodrigues, J. GEDAR: Geographic and opportunistic routing protocol with depth adjustment for mobile underwater sensor networks. In Proceedings of the 2014 IEEE International Conference on Communications (ICC), Sydney, Australia, 10–14 June 2014; pp. 251–256. [Google Scholar]
- Chen, H.; Lou, W. On protecting end-to-end location privacy against local eavesdropper in wireless sensor networks. Pervasive Mob. Comput. 2015, 16, 36–50. [Google Scholar] [CrossRef]
- Shah, D.; Kumar, V. TCP SYN Cookie Vulnerability. arXiv, 2018; arXiv:1807.08026. [Google Scholar]
- Law, Y.W.; Doumen, J.; Hartel, P. Survey and benchmark of block ciphers for wireless sensor networks. ACM Trans. Sens. Netw. 2006, 2, 65–93. [Google Scholar] [CrossRef] [Green Version]
- Bellare, M.; Canetti, R.; Krawczyk, H. Keying hash functions for message authentication. In Advances in Cryptology–CRYPTO’96; Springer: Berlin/Heidelberg, Germany, 1996; pp. 1–15. [Google Scholar]
- Teguig, E.H.; Touati, Y.; Ali-Cherif, A. ECC Based-Approach for Keys Authentication and Security in WSN. In Proceedings of the 2017 9th IEEE-GCC Conference and Exhibition (GCCCE), Manama, Bahrain, 8–11 May 2017; pp. 1–4. [Google Scholar]
- Simplicio, M.A., Jr.; Silva MV, M.; Alves RC, A.; Shibata, T.K. Lightweight and escrow-less authenticated key agreement for the internet of things. Comput. Commun. 2017, 98, 43–51. [Google Scholar] [CrossRef]
- Jiang, S.M. On securing underwater acoustic networks: A survey. IEEE Commun. Surv. Tutor. 2018. [Google Scholar] [CrossRef]
- Han, G.; Jiang, J.; Sun, N.; Shu, L. Secure communication for underwater acoustic sensor networks. IEEE Commun. Mag. 2015, 53, 54–60. [Google Scholar] [CrossRef]
- Luo, Y.; Pu, L.; Peng, Z.; Shi, Z. RSS-based secret key generation in underwater acoustic networks: Advantages, challenges, and performance improvements. IEEE Commun. Mag. 2016, 54, 32–38. [Google Scholar] [CrossRef]
- Peng, C.; Du, X.; Li, K.; Li, M. An ultra-lightweight encryption scheme in underwater acoustic networks. J. Sens. 2016, 2016, 8763528. [Google Scholar] [CrossRef]
- Yuan, C.; Chen, W.; Li, D. A Hierarchical Identity-Based Signcryption Scheme in Underwater Wireless Sensor Network. In Proceedings of the China Conference on Wireless Sensor Networks, Tianjin, China, 13–15 October 2017; Springer: Singapore, 2017; pp. 44–54. [Google Scholar]
- Hamid, M.A.; Abdullah-Al-Wadud, M.; Hassan, M.M.; Almogren, A.; Alamri, A.; Kamal, A.R.M.; Mamun-Or-Rashid, M. A key distribution scheme for secure communication in acoustic sensor networks. Futur. Gener. Comput. Syst. 2018, 86, 1209–1217. [Google Scholar] [CrossRef]
- Ateniese, G.; Capossele, A.; Gjanci, P.; Petrioli, C.; Spaccini, D. SecFUN: Security framework for underwater acoustic sensor networks. In Proceedings of the MTS/IEEE OCEANS, Genoa, Italy, 18–21 May 2015; pp. 1–9. [Google Scholar]
- Capossele, A.; Petrioli, C.; Saturni, G.; Spaccini, D.; Venturi, D. Securing Underwater Communications: Key Agreement based on Fully Hashed MQV. In Proceedings of the ACM International Conference on Underwater Networks & Systems, Halifax, NS, Canada, 6–8 November 2017; p. 12. [Google Scholar]
- Dini, G.; Lo Duca, A. A secure communication suite for underwater acoustic sensor networks. Sensors 2012, 12, 15133–15158. [Google Scholar] [CrossRef] [PubMed]
- Jiang, S. Wireless Networking Principles: From Terrestrial to Underwater Acoustic; Springer: Singapore, 2018. [Google Scholar]
- Goyal, N.; Dave, M.; Verma, A.K. Trust model for cluster head validation in underwater wireless sensor networks. Underw. Technol. 2017, 34, 107–114. [Google Scholar] [CrossRef]
- Luo, J.; Fan, L.; Wu, S.; Yan, X. Research on localization algorithms based on acoustic communication for underwater sensor networks. Sensors 2018, 18, 67. [Google Scholar] [CrossRef] [PubMed]
- Zhang, Y.; Jin, Z.G.; Luo, Y.M.; Du, X. Node secure localization algorithm in underwater sensor network based on trust mechanism. J. Comput. Appl. 2013, 33, 1208–1211. [Google Scholar] [CrossRef]
- Han, G.; Liu, L.; Jiang, J.; Shu, L.; Rodrigues, J.J. A collaborative secure localization algorithm based on trust model in underwater wireless sensor networks. Sensors 2016, 16, 229. [Google Scholar] [CrossRef] [PubMed]
- Das, A.P.; Thampi, S.M. Fault-resilient localization for underwater sensor networks. Ad Hoc Netw. 2017, 55, 132–142. [Google Scholar] [CrossRef]
- Varadharajan, K. Secure localization using coordinated gradient descent technique for underwater wireless sensor networks. ICTACT J. Commun. Technol. 2018, 9, 1716–1720. [Google Scholar]
- Liu, J.; Zhou, Z.; Peng, Z.; Cui, J.H.; Zuba, M.; Fiondella, L. Mobi-sync: Efficient time synchronization for mobile underwater sensor networks. IEEE Trans. Parallel Distrib. Syst. 2013, 24, 406–416. [Google Scholar] [CrossRef]
- Liu, J.; Wang, Z.; Zuba, M.; Peng, Z.; Cui, J.H.; Zhou, S. DA-Sync: A Doppler-assisted time-synchronization scheme for mobile underwater sensor networks. IEEE Trans. Mob. Comput. 2014, 13, 582–595. [Google Scholar] [CrossRef]
- Mortazavi, E.; Javidan, R.; Dehghani, M.J.; Kavoosi, V. A robust method for underwater wireless sensor joint localization and synchronization. Ocean Eng. 2017, 137, 276–286. [Google Scholar] [CrossRef]
- Vaseghi, B.; Pourmina, M.A.; Mobayen, S. Secure communication in wireless sensor networks based on chaos synchronization using adaptive sliding mode control. Nonlinear Dyn. 2017, 89, 1689–1704. [Google Scholar] [CrossRef]
- He, J.; Chen, J.; Cheng, P.; Cao, X. Secure time synchronization in wireless sensor networks: A maximum consensus-based approach. IEEE Trans. Parallel Distrib. Syst. 2014, 25, 1055–1065. [Google Scholar] [CrossRef]
- Vaseghi, B.; Pourmina, M.A.; Mobayen, S. Finite-time chaos synchronization and its application in wireless sensor networks. Trans. Inst. Meas. Control 2017. [Google Scholar] [CrossRef]
- Dini, G.; Duca, A.L. SeFLOOD: A secure network discovery protocol for Underwater Acoustic Networks. In Proceedings of the 2011 IEEE Symposium on Computers and Communications (ISCC), Kerkyra, Greece, 28 June–1 July 2011; pp. 636–638. [Google Scholar]
- Porkodi, K.P.; Zubair Rahman, A.M.J.M. Enhanced Underwater Wireless Sensor Networks Security with Tic-Tac-Toe Ai-Minimax Algorithm in Game Theory. Available online: http://www.tagajournal.com/gallery/v14.22.pdf (accessed on 20 October 2018).
- Peng, C.; Du, X. SDBR: A Secure Depth-Based Anonymous Routing Protocol in Underwater Acoustic Networks. Int. J. Perform. Eng. 2017, 13, 731–741. [Google Scholar] [CrossRef]
- Aman, W.; Rahman MM, U.; Qadir, J. Secure Routing in OFDM based Multi-Hop Underwater Acoustic Sensor Networks. arXiv, 2018; arXiv:1807.01556. [Google Scholar]
- Shen, J.; Tan, H.W.; Wang, J.; Wang, J.W.; Lee, S.Y. A novel routing protocol providing good transmission reliability in underwater sensor networks. J. Internet Technol. 2015, 16, 171–178. [Google Scholar]
- Han, S.Y.; Chen, Y.H.; Tang, G.Y. Fault diagnosis and fault-tolerant tracking control for discrete-time systems with faults and delays in actuator and measurement. J. Frankl. Inst. 2017, 354, 4719–4738. [Google Scholar] [CrossRef]
- Perrig, A.; Szewczyk, R.; Tygar, J.D.; Wen, V.; Culler, D.E. SPINS: Security protocols for sensor networks. Wirel. Netw. 2002, 8, 521–534. [Google Scholar] [CrossRef]
- Abdullah, K.M.; Houssein, E.H.; Zayed, H.H. Extended SPINS Framework for Security Wireless Sensor Network. Int. J. Comput. Sci. Issues 2017, 14, 58. [Google Scholar]
- Kadlikoppa, P.; Umarji, I.; Patil, S. Data Aggregation & Transfer in Data Centric Network Using Spin Protocol in WSN. Int. J. Recent Innov. Trends Comput. Commun. 2017, 5, 142–149. [Google Scholar]
- Karlof, C.; Sastry, N.; Wagner, D. TinySec: A link layer security architecture for wireless sensor networks. In Proceedings of the 2nd ACM International Conference on Embedded Networked Sensor Systems, Baltimore, MD, USA, 3–5 November 2004; pp. 162–175. [Google Scholar]
- Basu, S.; Pushpalatha, M. Analysis of energy efficient ECC and TinySec based security schemes in Wireless Sensor Networks. In Proceedings of the 2013 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS), Kattankulathur, India, 15–18 December 2013; pp. 1–6. [Google Scholar]
- Iqbal, U.; Intikhab, S. Re-keying mechanism for TinySec using ECC and Hash chains. In Proceedings of the 2017 4th IEEE International Conference on Advanced Computing and Communication Systems (ICACCS), Coimbatore, India, 6–7 January 2017; pp. 1–5. [Google Scholar]
- Luk, M.; Mezzour, G.; Perrig, A.; Gligor, V. MiniSec: A secure sensor network communication architecture. In Proceedings of the 6th IEEE International Symposium on Information Processing in Sensor Networks (IPSN 2007), Cambridge, MA, USA, 25–27 April 2007; pp. 479–488. [Google Scholar]
- Sharma, K.; Ghose, M.K. Security model for hierarchical clustered wireless sensor networks. Int. J. Comput. Sci. Secur. 2011, 5, 85–97. [Google Scholar]
Long Range | Medium Range | Short Range | |
---|---|---|---|
Communication Range | 20–2000 km | 1–10 km | <1 km |
Working Environment | Deep Water | Shallow Water | Deep Water |
Available Bandwidth | 500 Hz–10 kHz | 10–100 kHz | 100–500 kHz |
Data Rate | <10 kb/s | <50 kb/s | >100 kb/s |
Signal Source | Working Environment | Spreading Loss | |
---|---|---|---|
Spherical Wave Loss Model | point source | deep water | proportional to the square of the distance |
Cylindrical Wave Loss Model | long line source | shallow water | proportional to the distance |
Long-Distance | Medium-Distance | Short-Distance | |
---|---|---|---|
Spreading Loss Model | cylindrical wave | cylindrical wave and spherical wave | spherical wave |
Spreading Loss Factor | d = 1 | d = 1.5 | d = 2 |
© 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Yang, G.; Dai, L.; Wei, Z. Challenges, Threats, Security Issues and New Trends of Underwater Wireless Sensor Networks. Sensors 2018, 18, 3907. https://doi.org/10.3390/s18113907
Yang G, Dai L, Wei Z. Challenges, Threats, Security Issues and New Trends of Underwater Wireless Sensor Networks. Sensors. 2018; 18(11):3907. https://doi.org/10.3390/s18113907
Chicago/Turabian StyleYang, Guang, Lie Dai, and Zhiqiang Wei. 2018. "Challenges, Threats, Security Issues and New Trends of Underwater Wireless Sensor Networks" Sensors 18, no. 11: 3907. https://doi.org/10.3390/s18113907
APA StyleYang, G., Dai, L., & Wei, Z. (2018). Challenges, Threats, Security Issues and New Trends of Underwater Wireless Sensor Networks. Sensors, 18(11), 3907. https://doi.org/10.3390/s18113907