An Investigative Analysis of Underwater Wireless Sensor Network (UWSN) Security

Author(s):  
Jibran Rasheed Khan ◽  
Shariq Mahmood Khan ◽  
Farhan Ahmed Siddiqui

Background: The last few decades bring an astonishing revolution in technology and electronics which enabling small pieces of electronic devices into handy equipment, called sensors. The sensors enable 75% area of the world covered by water. Which is hardly 5% been explored and has numerous applications. The security of underwater wireless sensors network (UWNS) communication is a prime concern to protect advantages from technology and application purpose. This paper explores UWSN architecture, vulnerabilities, attacks, and possible factors that challenge UWSN security and its applications. Objectives: The primary objective of this work is to analyze the vulnerable factors that cause security challenges and threats to UWSN applications. This study focuses on the intermediate uplink point of UWSN architecture and evaluates it in three different test cases. This would be beneficial to build a better solution by devising an appropriate scheme in the future. Method: The denial of service (DoS) attack is simulated using ns-3 and Aquasim-ng simulator to determine which factor(s) threatening to the UWSN environment. The simulation is performed under three idealized underwater scenarios; 1) depicts general UWSN (a hybrid architecture), 2) a special case depicts UWSN environment with only underwater components, ands 3) depicts another special case with underwater sink UWSN environment. Assuming all three test case environments are vulnerable and threats to UWSN security. Result: In all three scenarios, the average network performance in the normal transmission is 88% and about ± 3% deviation is observed. Also, it observed that scenarios 1 and 2 are influenced by the adversary interference or malicious activity while there are no such effects that occur in scenario 3 in the absence of intermediate radio link or surface sink node(s). Thus, experiments found that among others, the intermediate radio link(s) of the onshore surface sink(s) or surface buoy(s) are vulnerable and threats to UWSN. Conclusion: The simulation results and observations found that the intermediate up-link in UWSN architecture found to be more vulnerable which makes it insecure. While, in a pure underwater environment, seem to be more secure compared to the general UWSN environment. In the future, more factors will be evaluate in the same or different cases to determine the UWSN issues and other vulnerable factors

2016 ◽  
Vol 6 (2) ◽  
pp. 1-10
Author(s):  
Chaima Bensaid ◽  
Sofiane Boukli Hacene ◽  
Kamel Mohamed Faraoun

Vehicular networks or VANET announce as the communication networks of the future, where the mobility is the main idea. These networks should be able to interconnect vehicles. The optimal goal is that these networks will contribute to safer roads and more effective in the future by providing timely information to drivers and concerned authorities. They are therefore vulnerable to many types of attacks among them the black hole attack. In this attack, a malicious node disseminates spurious replies for any route discovery in order to monopolize all data communication and deteriorate network performance. Many studies have focused on detecting and isolating malicious nodes in VANET. In this paper, the authors present two mechanisms to detect this attack. The main goal is detecting as well as bypass cooperative black hole attack. The authors' approaches have been evaluated by the detailed simulation study with NS2 and the simulation results shows an improvement of protocol performance.


2013 ◽  
Vol 59 (No. 12) ◽  
pp. 563-577
Author(s):  
A. Ejaz ◽  
P. Polak

The main objective of the paper is to seek the source that can explain the momentum profits because the source of momentum profits has been disputed. The secondary objective of the paper is to affirm the findings of the author about the presence of the short term momentum effect and to reaffirm the notion that CAPM cannot explain the momentum profits supported by a large number of authors. For the primary objective, a set of variables has been chosen, that fall under the category of “Business Indicators”, to explain the momentum profits. It is found that a variable “Starting a Business” could explain the source of the momentum profits whereas other variables may have a negligible or no influence over the momentum profits. It is also reaffirmed that a short term momentum effect has been found in 14 stock markets and the CAPM could not explain the momentum profits. This study is not conclusive due to the limitation of data but it does give a source of the momentum profits and it sheds light on the future research about the sources that can explain momentum profits in a great detail.


2021 ◽  
Vol 13 (0203) ◽  
pp. 110-116
Author(s):  
Sunil Kumar ◽  
Maninder Singh

A Mobile Ad Hoc Network (MANET) is much more vulnerable to various security attacks due to its high mobility, multi-hop communication and the absence of centralized administration. In this paper, we investigate the impact of Jellyfish periodic dropping attack on MANETs under different routing protocols. This investigate is under the class of denial-of-service attack and targets closed loop flows which results in delay and data loss. In this paper, the simulation results are gathered using OPNET network simulator and its effect on network performance is studied by analysing re-transmission attempts, network load and throughput. The results have shown that the impact of Jellyfish periodic dropping attack which reduces the network performance. Performance shows OLSR performs better than AODV under periodic drop attack.


2002 ◽  
pp. 79-89 ◽  
Author(s):  
Slobodanka Mitrovic ◽  
Stanisa Bankovic

Based on the presented study results, it can be concluded that the distribution of tree numbers per diameter degrees (diameter structure) in the four measurements of the compartments 51 and 75, did not change. It was also concluded that one functional dependence could be applied for both compartments N=e5,9?e?0,39*d The result of the above is that also in the following measurements, the diameter structure will remain unchanged, in cases of the same or similar selection cuttings both by the scope and by the distribution of felled trees per diameter classes The primary objective of this type of study is to predict, based on a mathematical model of diameter structure development, effect of the scope of selection cuttings and the number of recruitments on the diameter structure, and the simulation of growth, the distribution of trees per diameter classes in the following measurement or measurements, i.e. to foresee the future development of selection stands.


Author(s):  
Satvir Kaur, Gureshpal Singh, Baljinder Singh

Denial of service is one of the most terrible attacks is the cloning attack of the node, where the attacker captures the knot and extracts its secret information, create replicas and enter them in the network field other malevolent behavior. To detect and mitigate this attack, several static-based detection schemes have been proposed. The detection algorithm based on the node location speed was proposed, to detect the attack of nodes clones in the wireless network. This algorithm reduces the costs of communication, routing, overloading the entire network and improving network performance.


Author(s):  
Neil C. Rowe ◽  
E. John Custy

Cyberspace, computers, and networks are now potential terrain of warfare. We describe some effective forms of deception in cyberspace and discuss how these deceptions are used in attacks. After a general assessment of deception opportunities in cyberspace, we consider various forms of identity deceptions, denial-of-service attacks, Trojan horses, and several other forms of deception. We then speculate on the directions in which cyber attacks may evolve in the future.


2012 ◽  
Vol 433-440 ◽  
pp. 5073-5077
Author(s):  
Jing Yao Wang ◽  
Meng Jia Li ◽  
Mei Song ◽  
Ying Hai Zhang

Information theory has made great impact on the research of communication systems. However, analyze and design of networks has not benefited too much from information theory. Therefore, in this paper, we propose the information-theoretical framework of context aware network to explore the relationship between the information and the network performance. We also analyze the information traffic process in context aware network. To illustrate our approach, we analyze the architecture of context aware network by the information entropy produced in the network, and discuss the way to improve the performance of context aware in an information-theoretic perspective. The results in this paper may be also used to design other network and guide the future network design.


Author(s):  
RAMAKRUSHNA SWAIN ◽  
NARENDRA KUMAR KAMILA

This paper focuses on current progress for the understanding of human cognition. Here different models have been considered such as MLP, FLANN, PNN, MLR, and HSN for recognition of one of the state of mind. It is argued that in addition to other models, PSO occupies a prominent place in the future of cognitive science, and that cognitive scientists should play an active role in the process. Baysian Approach in the same context has also discussed. The special case of predicting harm doing in a particular mental state has been experimented taking different models into account in depicting decision making as a process of probabilistic, knowledge-driven inference.


2018 ◽  
Vol 8 (2) ◽  
pp. 5913-5918

One of the effective communication technology is wireless sensor network technology which helps to monitor the surrounding information by sensed nodes. The effective utilization of sensed nodes is utilized in different applications such as military, health information, environmental monitoring, disaster relief and target analyze. The application requires the collection of information which may be collected from one location and transferred to the other location for making their process so easier. During the information transformation process, the network may affect by several intermediate attack, in which denial of service is one of the serious attack because it affects the entire network resources such as network energy, power, bandwidth. The unavailability of the resources reduces the entire sensor network performance. For managing the attack related issues, in this paper introduces the Energy Efficient Extreme Learning Neural Network (EEELNN) approach for overcoming the attack related issues. Initially the network transmitted zone is computed along with energy, power, bandwidth, neighboring node information and lifetime for eliminating the attack in sensor network. The computed information is processed and trained by extreme learning neural network that successfully predict the attack related data, node and network zone with effective manner that leads to improve the overall network performance. At last system efficiency is evaluated using simulation results such as detection rate, classification accuracy, false alarm rate and detection time.


Sign in / Sign up

Export Citation Format

Share Document