Software-Defined Cyber–Energy Secure Underwater Wireless Power Transfer

Underwater wireless power transfer (UWPT) is a critical infrastructure for supplying power to underwater devices, such as underwater sensors and autonomous underwater vehicles. Enabling a software-defined architecture for UWPT promises to build a flexible and programmable underwater energy network. Although it is crucial that UWPT be made more resilient to cyberattacks and energy stealing, this remains an open challenge. In this article, we propose a software-defined UWPT (SD-UWPT) system that is both cyber and energy secure. A moving target defense approach and an active synchronous detection method are developed to protect the SD-UWPT against scanning-based attacks and power bot attacks. To enable energy-secure UWPT, an impedance measurement based approach is further established to prevent energy stealing. Through comprehensive evaluations, we validate the benefits of SD-UWPT and demonstrate the effectiveness of the proposed cyber–energy secure strategies against various attacks.

[1]  Peng Zhang,et al.  Underwater wireless power transfer for ocean system applications , 2016, OCEANS 2016 MTS/IEEE Monterey.

[2]  Yan Li,et al.  SDN-Enabled Cyber-Physical Security in Networked Microgrids , 2019, IEEE Transactions on Sustainable Energy.

[3]  A. Robin Wallace,et al.  A Fully Coupled Wave-to-Wire Model of an Array of Wave Energy Converters , 2016, IEEE Transactions on Sustainable Energy.

[4]  Ming Xu,et al.  An ACOA-AFSA Fusion Routing Algorithm for Underwater Wireless Sensor Network , 2012, Int. J. Distributed Sens. Networks.

[5]  Lei Xu,et al.  FloodGuard: A DoS Attack Prevention Extension in Software-Defined Networks , 2015, 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.

[6]  Taofeek Orekan,et al.  Underwater Wireless Power Transfer: Smart Ocean Energy Converters , 2018 .

[7]  Sakir Sezer,et al.  Sdn Security: A Survey , 2013, 2013 IEEE SDN for Future Networks and Services (SDN4FNS).

[8]  Cheng En,et al.  Underwater Wireless Control and Transmission System Based on GSM Short Message , 2006, 2006 International Conference on Communications, Circuits and Systems.

[9]  Athanasios V. Vasilakos,et al.  Jamming in underwater sensor networks: detection and mitigation , 2012, IET Commun..

[10]  D. G. Dorrell,et al.  Development of a Wave Energy Converter Using a Two Chamber Oscillating Water Column , 2012, IEEE Transactions on Sustainable Energy.

[11]  Joel J. P. C. Rodrigues,et al.  Underwater Wireless Sensor Communications in the 2.4 GHz ISM Frequency Band , 2012, Sensors.

[12]  Chaofeng Wang,et al.  Signal alignment for secure underwater coordinated multipoint transmissions , 2014, 2014 IEEE Conference on Communications and Network Security.

[13]  Mari Carmen Domingo,et al.  Securing underwater wireless communication networks , 2011, IEEE Wireless Communications.

[14]  Shengming Jiang,et al.  On Securing Underwater Acoustic Networks: A Survey , 2019, IEEE Communications Surveys & Tutorials.

[15]  Ehab Al-Shaer,et al.  Openflow random host mutation: transparent moving target defense using software defined networking , 2012, HotSDN '12.

[16]  Ian F. Akyildiz,et al.  SoftWater: Software-defined networking for next-generation underwater communication systems , 2016, Ad Hoc Networks.

[17]  Arne Lie,et al.  Underwater Wireless Sensor Network , 2010, 2010 Fourth International Conference on Sensor Technologies and Applications.

[18]  Liang Xiao,et al.  Jamming Games in Underwater Sensor Networks with Reinforcement Learning , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).

[19]  Nadeem Javaid,et al.  An Efficient Data-Gathering Routing Protocol for Underwater Wireless Sensor Networks , 2015, Sensors.

[20]  Georges Kaddoum,et al.  Underwater Optical Wireless Communication , 2016, IEEE Access.

[21]  Marco Canini,et al.  A NICE Way to Test OpenFlow Applications , 2012, NSDI.

[22]  Azween Abdullah,et al.  Hop-by-Hop Dynamic Addressing Based (H2-DAB) Routing Protocol for Underwater Wireless Sensor Networks , 2009, 2009 International Conference on Information and Multimedia Technology.

[23]  Roberto Petroccia,et al.  CARP: A Channel-aware routing protocol for underwater acoustic wireless networks , 2015, Ad Hoc Networks.

[24]  Zhen Zhang,et al.  Energy Encryption for Wireless Power Transfer , 2015, IEEE Transactions on Power Electronics.

[25]  Chien-Chi Kao,et al.  A Comprehensive Study on the Internet of Underwater Things: Applications, Challenges, and Channel Models † , 2017, Sensors.

[26]  Gregory R. Andrews,et al.  Effïcient Implementation of Elliptic Curve Cryptography on DSP for Underwater Sensor Networks , 2009 .

[27]  Peng Zhang,et al.  Software-Defined Microgrid Control: The Genesis of Decoupled Cyber-Physical Microgrids , 2020, IEEE Open Access Journal of Power and Energy.

[28]  Guangjie Han,et al.  Detecting Sybil attack based on state information in Underwater Wireless Sensor Networks , 2013, 2013 21st International Conference on Software, Telecommunications and Computer Networks - (SoftCOM 2013).

[29]  Peter B. Luh,et al.  Enabling Resilient Microgrid Through Programmable Network , 2017, IEEE Transactions on Smart Grid.

[30]  Wei Zhou,et al.  Security in Underwater Sensor Network , 2010, 2010 International Conference on Communications and Mobile Computing.

[31]  Ehab Al-Shaer,et al.  FlowChecker: configuration analysis and verification of federated openflow infrastructures , 2010, SafeConfig '10.

[32]  Yuan Li,et al.  Research challenges and applications for underwater sensor networking , 2006, IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006..

[33]  Yi Huang,et al.  Experimental study of secret key generation in underwater acoustic channels , 2014, 2014 48th Asilomar Conference on Signals, Systems and Computers.

[34]  W. Buck,et al.  MININET , 1979, Prax. Inf.verarb. Kommun..

[35]  Nick McKeown,et al.  OpenFlow: enabling innovation in campus networks , 2008, CCRV.

[36]  Timothy L. Hinrichs Expressing and Enforcing Flow-Based Network Security Policies , 2008 .

[37]  Hao Wang,et al.  Eavesdropping attacks in underwater acoustic networks , 2015, 2015 10th International Conference on Information, Communications and Signal Processing (ICICS).

[38]  M. N. Sahinkaya,et al.  A review of wave energy converter technology , 2009 .