Security in Underwater Sensor Network

Underwater wireless sensor network is a novel type of underwater networked system. Due to the characteristics of UWSN and underwater channel, UWSN are vulnerable to malicious attacks. The existing security solutions proposed for WSN cannot be used directly in UWSN. Moreover, most of these solutions are layer wise. In this paper, we studied the threat, attack, and security issues of UWSN. Subsequently, we argue that layered security schemes cannot protect UWSN against blended attacks. Additionally, we presented a novel preliminary conceive, which is a cross-layer, adaptive, selective security scheme.

[1]  Milica Stojanovic,et al.  Shallow water acoustic networks , 2001, IEEE Commun. Mag..

[2]  Dario Pompili,et al.  Three-dimensional and two-dimensional deployment analysis for underwater acoustic sensor networks , 2009, Ad Hoc Networks.

[3]  Scott F. Midkiff,et al.  Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols , 2009, IEEE Transactions on Vehicular Technology.

[4]  Cristina Alcaraz,et al.  Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks , 2009, FOSAD.

[5]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[6]  Bharat K. Bhargava,et al.  Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks , 2005, WiSe '05.

[7]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[8]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[9]  Xiao Mingbo Design of cross-layer security for wireless sensor network's , 2007 .

[10]  Yee Wei Law,et al.  Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols , 2005, TOSN.

[11]  Bin Ma,et al.  Cross-Layer Trust Model and Algorithm of Node Selection in Wireless Sensor Networks , 2009, 2009 International Conference on Communication Software and Networks.

[12]  Yunghsiang Sam Han,et al.  A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.

[13]  Hu Hong Dynamic Hierarchical Multicast Routing with Delay-Bandwidth Constraints , 2009 .

[14]  M. Gerla,et al.  Challenges : Building Scalable and Distributed Underwater Wireless Sensor Networks ( UWSNs ) for Aquatic Applications , 2005 .

[15]  Pekka Nikander,et al.  DOS-Resistant Authentication with Client Puzzles , 2000, Security Protocols Workshop.

[16]  Rodrigo Roman,et al.  A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks , 2008, CANS.

[17]  Albert F. Harris,et al.  Energy-efficient reliable broadcast in underwater acoustic networks , 2007, WuWNet '07.

[18]  Gilles Burel,et al.  A chaotic Direct-Sequence Spread-Spectrum system for underwater communication , 2002, OCEANS '02 MTS/IEEE.

[19]  Azzedine Boukerche,et al.  Secure localization algorithms for wireless sensor networks , 2008, IEEE Communications Magazine.

[20]  Tuomas Aura DOS-Resistant Authentication with Client Puzzles (Transcript of Discussion) , 2000, Security Protocols Workshop.

[21]  Sunil Kumar,et al.  Vertical and horizontal synchronization services with outlier detection in underwater acoustic networks , 2008, Wirel. Commun. Mob. Comput..

[22]  Bharat K. Bhargava,et al.  Visualisation of wormholes in underwater sensor networks : a distributed approach , 1993 .