Security in UWANs

Weak security is Achilles’ heel of many wireless networks because of the severe security situation caused by the broadcast nature of wireless media, mobility and heterogenous user profiles. Communication capacity, computation capability and energy supply are constrained for countering against security threats in wireless networks. This situation becomes even worse in UWANs because the resources are much more constrained while security situation is more server due to special networking environments. The peculiar features of UWANs cause existing solutions proposed for radio wireless networks (RWNs) cannot be used directly in UWANs (Stojanovic, ACM Mob Comput Commun Rev 11(4): 34–43, 2007, [1], Jiang and Xu, Adv Mater Res 317–319:1002–1006, 2011, [2], Dini and Duca, Sensors 12(11):15133–15158, 2012, [3]). This chapter discusses some typical proposals for UWAN security.

[1]  Zhijie Jerry Shi,et al.  RSS-based secret key generation in underwater acoustic networks: advantages, challenges, and performance improvements , 2016, IEEE Communications Magazine.

[2]  Moti Yung,et al.  Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..

[3]  Rui Zhang,et al.  Wormhole-Resilient Secure Neighbor Discovery in Underwater Acoustic Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[4]  Mari Carmen Domingo,et al.  Securing underwater wireless communication networks , 2011, IEEE Wireless Communications.

[5]  Reihaneh Safavi-Naini,et al.  An Efficient Signature Scheme from Bilinear Pairings and Its Applications , 2004, Public Key Cryptography.

[6]  Roberto Petroccia,et al.  CARP: A Channel-aware routing protocol for underwater acoustic wireless networks , 2015, Ad Hoc Networks.

[7]  Gianluca Dini,et al.  A cryptographic suite for underwater cooperative applications , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).

[8]  Gianluca Dini,et al.  A Secure Communication Suite for Underwater Acoustic Sensor Networks , 2012, Sensors.

[9]  Milica Stojanovic,et al.  On the relationship between capacity and distance in an underwater acoustic communication channel , 2007, MOCO.

[10]  Christof Zalka,et al.  Shor's discrete logarithm quantum algorithm for elliptic curves , 2003, Quantum Inf. Comput..

[11]  Yi Xu,et al.  Research Advances on Security Problems of Underwater Sensor Networks , 2011 .

[12]  Athanasios V. Vasilakos,et al.  ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks , 2012, IEEE Transactions on Information Technology in Biomedicine.

[13]  Dario Pompili,et al.  A CDMA-based Medium Access Control for UnderWater Acoustic Sensor Networks , 2009, IEEE Transactions on Wireless Communications.

[14]  Michael Zuba,et al.  Vulnerabilities of underwater acoustic networks to denial-of-service jamming attacks , 2015, Secur. Commun. Networks.

[15]  Mohsen Guizani,et al.  An Attack-Resistant Trust Model Based on Multidimensional Trust Metrics in Underwater Acoustic Sensor Network , 2015, IEEE Transactions on Mobile Computing.

[16]  Bharat K. Bhargava,et al.  Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks , 2005, WiSe '05.

[17]  Guangjie Han,et al.  Detecting Sybil attack based on state information in Underwater Wireless Sensor Networks , 2013, 2013 21st International Conference on Software, Telecommunications and Computer Networks - (SoftCOM 2013).

[18]  Athanasios V. Vasilakos,et al.  Jamming in underwater sensor networks: detection and mitigation , 2012, IET Commun..

[19]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..

[20]  David E. Culler,et al.  SPINS: security protocols for sensor networks , 2001, MobiCom '01.

[21]  Helge Rustad A Lightweight Protocol Suite for Underwater Communication , 2009, 2009 International Conference on Advanced Information Networking and Applications Workshops.

[22]  Xiuzhen Cheng,et al.  Silent Positioning in Underwater Acoustic Sensor Networks , 2008, IEEE Transactions on Vehicular Technology.

[23]  Limin Sun,et al.  Security and privacy in localization for underwater sensor networks , 2015, IEEE Communications Magazine.

[24]  Ueli Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[25]  Guangjie Han,et al.  A Trust Model Based on Cloud Theory in Underwater Acoustic Sensor Networks , 2017, IEEE Transactions on Industrial Informatics.

[26]  Yi Huang,et al.  Experimental study of secret key generation in underwater acoustic channels , 2014, 2014 48th Asilomar Conference on Signals, Systems and Computers.

[27]  Bruce Schneier,et al.  Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .

[28]  Sachin Katti,et al.  Embracing wireless interference: analog network coding , 2007, SIGCOMM.

[29]  Yang Xiao,et al.  Vertical and horizontal synchronization services with outlier detection in underwater acoustic networks , 2008 .

[30]  Raymond Knopp,et al.  A practical method for wireless channel reciprocity exploitation through relative calibration , 2005, Proceedings of the Eighth International Symposium on Signal Processing and Its Applications, 2005..

[31]  Mauro Conti,et al.  Secure underwater acoustic networks: Current and future research directions , 2016, 2016 IEEE Third Underwater Communications and Networking Conference (UComms).

[32]  Gianluca Dini,et al.  SeFLOOD: A secure network discovery protocol for Underwater Acoustic Networks , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).

[33]  John S. Thompson,et al.  Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.

[34]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[35]  Chiara Petrioli,et al.  R-CARP: A Reputation Based Channel Aware Routing Protocol for Underwater Acoustic Sensor Networks , 2015, WUWNet.

[36]  Shengming Jiang,et al.  On Securing Underwater Acoustic Networks: A Survey , 2019, IEEE Communications Surveys & Tutorials.

[37]  W. Seah,et al.  An Area Localization Scheme for Underwater Sensor Networks , 2006, OCEANS 2006 - Asia Pacific.

[38]  Ítalo S. Cunha,et al.  End-to-end authentication in Under-Water Sensor Networks , 2013, 2013 IEEE Symposium on Computers and Communications (ISCC).

[39]  Gianluca Dini,et al.  Secure Cooperation of Autonomous Mobile Sensors Using an Underwater Acoustic Network , 2012, Sensors.

[40]  Deying Li,et al.  A Low Computational Complexity Authentication Scheme in Underwater Wireless Sensor Network , 2015, 2015 11th International Conference on Mobile Ad-hoc and Sensor Networks (MSN).

[41]  Dario Pompili,et al.  Overview of networking protocols for underwater wireless communications , 2009, IEEE Communications Magazine.

[42]  Alfred Menezes,et al.  PGP in Constrained Wireless Devices , 2000, USENIX Security Symposium.

[43]  Dimitrios Koutsonikolas,et al.  Securing underwater acoustic communications through analog network coding , 2014, 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).

[44]  Soo-Hyun Park,et al.  CCM-UW Security Modes for Low-band Underwater Acoustic Sensor Networks , 2016, Wirel. Pers. Commun..

[45]  Sabu M. Thampi,et al.  Secure communication in mobile underwater wireless sensor networks , 2015, 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[46]  Mauro Conti,et al.  Toward the Development of Secure Underwater Acoustic Networks , 2017, IEEE Journal of Oceanic Engineering.

[47]  Chiara Petrioli,et al.  SecFUN: Security framework for underwater acoustic sensor networks , 2015, OCEANS 2015 - Genova.

[48]  Kiyomichi Araki,et al.  Overview of Elliptic Curve Cryptography , 1998, Public Key Cryptography.

[49]  Guangjie Han,et al.  A Trust Cloud Model for Underwater Wireless Sensor Networks , 2017, IEEE Communications Magazine.

[50]  Mauro Conti,et al.  Attack Resilient Underwater Networks Through Software Defined Networking , 2014, WUWNet.

[51]  Isaac L. Chuang,et al.  Quantum Computation and Quantum Information (10th Anniversary edition) , 2011 .

[52]  Emrecan Demirors,et al.  Advances in Underwater Acoustic Networking , 2013, Mobile Ad Hoc Networking.

[53]  Wenliang Du,et al.  Cooperative Key Generation in Wireless Networks , 2012, IEEE Journal on Selected Areas in Communications.

[54]  Bharat K. Bhargava,et al.  Visualisation of wormholes in underwater sensor networks : a distributed approach , 1993 .

[55]  Wei Zhou,et al.  Security in Underwater Sensor Network , 2010, 2010 International Conference on Communications and Mobile Computing.

[56]  B. R. Badrinath,et al.  DV Based Positioning in Ad Hoc Networks , 2003, Telecommun. Syst..

[57]  Robert J. Urick,et al.  Principles of underwater sound , 1975 .

[58]  Elaine B. Barker,et al.  SP 800-56B. Recommendation for Pair-Wise Key Establishment Schemes Using Integer Factorization Cryptography , 2009 .

[59]  Rajashri Khanai,et al.  Localization, routing and its security in UWSN — A survey , 2016, 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT).

[60]  Ning Sun,et al.  Secure communication for underwater acoustic sensor networks , 2015, IEEE Communications Magazine.

[61]  Ming Li,et al.  Cognitive Code-Division Links with Blind Primary-System Identification , 2011, IEEE Transactions on Wireless Communications.

[62]  Peter Kruus,et al.  CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .

[63]  Srdjan Capkun,et al.  Secure neighborhood discovery: a fundamental element for mobile ad hoc networking , 2008, IEEE Communications Magazine.

[64]  Gianluca Dini,et al.  S2RP: a Secure and Scalable Rekeying Protocol for Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[65]  Cheng Li,et al.  Design and Evaluation of a New Localization Scheme for Underwater Acoustic Sensor Networks , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[66]  Michael Zuba,et al.  Uncooperative localization improves attack performance in Underwater Acoustic Networks , 2014, 2014 IEEE Conference on Communications and Network Security.

[67]  Ian F. Akyildiz,et al.  A survey on wireless mesh networks , 2005, IEEE Communications Magazine.

[68]  Ming Li,et al.  Waveform Design for Secure SISO Transmissions and Multicasting , 2013, IEEE Journal on Selected Areas in Communications.

[69]  Lei Yu,et al.  A Trust Model Based on Subjective Logic for Multi-Domains in Grids , 2008, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application.