R-CARP: A Reputation Based Channel Aware Routing Protocol for Underwater Acoustic Sensor Networks

In this paper we introduce R-CARP, a reputation based channel aware routing protocol for underwater acoustic sensor networks (UASNs). While many routing protocols have been proposed for UASNs, solutions to secure routing protocols from attacks such as sinkhole attack and selective forwarding are still overlooked. These routing attacks can dramatically disrupt network performance, especially in some application scenarios such as homeland security and critical infrastructure monitoring, where a high reliability on message delivery is required. Designing secure and reliable protocols for UASNs is particularly challenging due to acoustic modems unique characteristics such as low bandwidth and bit rate, high propagation delays and high energy consumption when in transmit mode. The aim of this work is therefore to propose R-CARP, a secure and reliable routing protocol tailored to such communication constrained environment. R-CARP is an improved version of CARP, the channel aware routing protocol presented in [5], enriched with a reputation based mechanism to contrast malicious node behavior. To secure R-CARP we employ BLS, a short digital signature algorithm, exploiting its aggregation property to reduce the additional communication overhead. By means of simulation based performance evaluation, we show that, under attack, R-CARP is effective at bypassing malicious nodes and outperforms CARP in terms of packet delivery ratio (PDR) and energy per bit (EPB) by a factor of up to 2, at the cost of a slight increment in terms of latency.

[1]  Rui Zhang,et al.  Wormhole-Resilient Secure Neighbor Discovery in Underwater Acoustic Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[2]  Mari Carmen Domingo,et al.  Securing underwater wireless communication networks , 2011, IEEE Wireless Communications.

[3]  Gianluca Dini,et al.  Towards a reputation-based routing protocol to contrast blackholes in a delay tolerant network , 2012, Ad Hoc Networks.

[4]  Milica Stojanovic,et al.  Underwater sensor networks: applications, advances and challenges , 2012, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.

[5]  Chiara Petrioli,et al.  AGREE: exploiting energy harvesting to support data-centric access control in WSNs , 2013, Ad Hoc Networks.

[6]  Robert J. Urick,et al.  Principles of underwater sound , 1975 .

[7]  Gianluca Dini,et al.  A Secure Communication Suite for Underwater Acoustic Sensor Networks , 2012, Sensors.

[8]  M. Stojanovic,et al.  Optimized Packet Size Selection in Underwater Wireless Sensor Network Communications , 2012, IEEE Journal of Oceanic Engineering.

[9]  A. Menezes An Introduction to Pairing-Based Cryptography , 2005 .

[10]  Giuseppe Piro,et al.  Key Management Protocol with Implicit Certificates for IoT systems , 2015, IoT-Sys@MobiSys.

[11]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..

[12]  Ivano Calabrese,et al.  Performance evaluation of forwarding protocols for the RACUN network , 2013, WUWNet.

[13]  Chiara Petrioli,et al.  Low-cost Standard Signatures in Wireless Sensor Networks: A Case for Reviving Pre-computation Techniques? , 2013, NDSS.

[14]  Michele Zorzi,et al.  Multipath Routing With Limited Cross-Path Interference in Underwater Networks , 2014, IEEE Wireless Communications Letters.

[15]  Bharat K. Bhargava,et al.  Visualisation of wormholes in underwater sensor networks : a distributed approach , 1993 .

[16]  Tassos Dimitriou,et al.  Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks , 2007, ALGOSENSORS.

[17]  Mauro Conti,et al.  Attack Resilient Underwater Networks Through Software Defined Networking , 2014, WUWNet.

[18]  Immanuel John Raja Jebadurai,et al.  Sinkhole detection in mobile ad-hoc networks using mutual understanding among nodes , 2011, 2011 3rd International Conference on Electronics Computer Technology.

[19]  Chiara Petrioli,et al.  Security as a CoAP resource: An optimized DTLS implementation for the IoT , 2015, 2015 IEEE International Conference on Communications (ICC).

[20]  Chiara Petrioli,et al.  Flexible key exchange negotiation for wireless sensor networks , 2010, WiNTECH '10.

[21]  Roberto Petroccia,et al.  CARP: A Channel-aware routing protocol for underwater acoustic wireless networks , 2015, Ad Hoc Networks.

[22]  Chiara Petrioli,et al.  A multi-band Noise-aware MAC protocol for underwater acoustic sensor networks , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[23]  John R. Potter,et al.  MPR: Multi-Point Relay protocol for Underwater Acoustic Networks , 2014, WUWNet.

[24]  Michele Zorzi,et al.  Jamming-resistant multi-path routing for reliable intruder detection in underwater networks , 2011, WUWNet.

[25]  John R. Potter,et al.  The SUNSET framework for simulation, emulation and at-sea testing of underwater wireless sensor networks , 2015, Ad Hoc Networks.

[26]  R. Petroccia,et al.  A comparative performance evaluation of MAC protocols for underwater sensor networks , 2008, OCEANS 2008.

[27]  Chiara Petrioli,et al.  SecFUN: Security framework for underwater acoustic sensor networks , 2015, OCEANS 2015 - Genova.

[28]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .