Security mechanism for maritime territory and frontier surveillance in naval operations using wireless sensor networks

In an underwater environment, wireless sensor networks (WSNs) have more potential applications such as homeland safety, naval surveillance, and pollution & exploration monitoring. Underwater wireless sensor networks (UWSNs) help in decreasing the rate of causalities and provide efficient ways for monitoring the underwater activities of the other countries. UWSNs can be efficiently used by the navy to monitor suspicious activities and also to counter‐attack any terrorist or enemy attacks. As usual, deploying wireless sensor networks underwater is not only challenging due to environment and constrained resources but also is vulnerable to security attacks. Thus, security is an unexplored and crucial aspect of UWSNs. Here, we define a node authentication mechanism for UWSNs for securing frontier lines, maritime territory, and naval surveillance. The proposed authentication protocol is based on symmetric‐key cryptography and secures against impersonation, masquerade, Sybil, and many more other attacks. We have analyzed the proposed protocol both formally and automatedly and were unable to find any possible security attack on the proposed protocol. The experimental analysis of the mechanism proved that the proposed mechanism consumes less energy compared to the existing mechanisms. Hence, the proposed mechanism can be easily adopted for maintaining the security of maritime territory and reduce the causalities in naval operations.

[1]  Muzzammil Hussain,et al.  Underwater Wireless Sensor Networks , 2020, Handbook of Computer Networks and Cyber Security.

[2]  Martín Abadi,et al.  A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[3]  Luca Viganò,et al.  Automated Security Protocol Analysis With the AVISPA Tool , 2006, MFPS.

[4]  Martín Abadi,et al.  A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[5]  Arne Lie,et al.  Underwater Wireless Sensor Network , 2010, 2010 Fourth International Conference on Sensor Technologies and Applications.

[6]  Kwangjo Kim,et al.  Untraceable Mobile Node Authentication in WSN , 2010, Sensors.

[7]  Gianluca Dini,et al.  Secure Cooperation of Autonomous Mobile Sensors Using an Underwater Acoustic Network , 2012, Sensors.

[8]  Paolo Casari,et al.  Cooperative Authentication in Underwater Acoustic Sensor Networks , 2018, IEEE Transactions on Wireless Communications.

[9]  Milica Stojanovic,et al.  Underwater sensor networks: applications, advances and challenges , 2012, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.

[10]  Muzzammil Hussain,et al.  Simple, secure, and lightweight mechanism for mutual authentication of nodes in tiny wireless sensor networks , 2020, Int. J. Commun. Syst..

[11]  Liang Xiao,et al.  Learning-Based PHY-Layer Authentication for Underwater Sensor Networks , 2019, IEEE Communications Letters.

[12]  Chiara Petrioli,et al.  SecFUN: Security framework for underwater acoustic sensor networks , 2015, OCEANS 2015 - Genova.

[13]  Dario Pompili,et al.  Underwater acoustic sensor networks: research challenges , 2005, Ad Hoc Networks.

[14]  J. Kerr,et al.  Robot operating systems: Bridging the gap between human and robot , 2012, Proceedings of the 2012 44th Southeastern Symposium on System Theory (SSST).

[15]  M. Shamim Kaiser,et al.  A novel algorithm for malicious attack detection in UWSN , 2015, 2015 International Conference on Electrical Engineering and Information Communication Technology (ICEEICT).

[16]  Daqi Zhu,et al.  A Cluster-Based Secure Synchronization Protocol for Underwater Wireless Sensor Networks , 2014, Int. J. Distributed Sens. Networks.

[17]  Waqas Aman,et al.  Impersonation Detection in Line-of-Sight Underwater Acoustic Sensor Networks , 2018, IEEE Access.

[18]  Thomas Genet SPAN+AVISPA for Verifying Cryptographic Protocols , 2017 .

[19]  Shengli Zhou,et al.  Aqua-Sim: An NS-2 based simulator for underwater sensor networks , 2009, OCEANS 2009.

[20]  Soo-Hyun Park,et al.  Ticket-based authentication protocol for Underwater Wireless Sensor Network , 2016, 2016 Eighth International Conference on Ubiquitous and Future Networks (ICUFN).

[21]  Ayaz Hassan Moon,et al.  Implementation of Node Authentication for WSN Using Hash Chains , 2016 .

[22]  Hari Om,et al.  Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines , 2016, Comput. Networks.

[23]  Imad Mahgoub,et al.  HIKES: Hierarchical key establishment scheme for wireless sensor networks , 2014, Int. J. Commun. Syst..

[24]  Deying Li,et al.  A Hierarchical Identity-Based Signcryption Scheme in Underwater Wireless Sensor Network , 2017, CWSN.

[25]  Yuan Li,et al.  Research challenges and applications for underwater sensor networking , 2006, IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006..

[26]  Deying Li,et al.  A Low Computational Complexity Authentication Scheme in Underwater Wireless Sensor Network , 2015, 2015 11th International Conference on Mobile Ad-hoc and Sensor Networks (MSN).

[27]  Ming Xu,et al.  SenseVault: A Three-tier Framework for Securing Mobile Underwater Sensor Networks , 2018, IEEE Transactions on Mobile Computing.