Security Issues in Underwater Sensor Networks: Attacks and Defenses

2014 ◽  
Vol 644-650 ◽  
pp. 2689-2698
Author(s):  
Ling Feng Liu ◽  
Mao De Ma

Underwater Sensor Network (UWSN) is a powerful technique for aquatic applications. Although the international researches on this topic are quite prosperous, it is still in its early stage of development. UWSN is vulnerable to various kinds of attacks because it is usually deployed in hostile environments. This paper systematically summarizes and analyzes the existing security attacks and defensive mechanisms of the UWSN. We expect it can offer a theoretical reference for the establishment of the UWSN security system.

Sensors ◽  
2019 ◽  
Vol 19 (1) ◽  
pp. 156 ◽  
Author(s):  
Wenbo Zhang ◽  
Jing Wang ◽  
Guangjie Han ◽  
Xinyue Zhang ◽  
Yongxin Feng

3D topology control in underwater sensor networks is of great significance to ensuring reliable and efficient operation of the network. In this paper, by analyzing the characteristics of an underwater sensor network, we take the cube as the basic unit to perform 3D partition of the monitoring area, define the 3D partition unit and basic cluster structure of the underwater sensor network, and arrange rotating temporary control nodes in the cluster. Then, a cluster sleep-wake scheduling algorithm is proposed that compares the remaining node energy. It selects the node with the largest remaining energy as the working node, and the remaining nodes complete the transition of dormancy and waiting states as long as they reach the preset dormancy time. The node state settings of this phase are completed by the temporary control node. Temporary control nodes selecting and sleep-wake scheduling are used in the algorithm through 3D topology control, which reduces energy consumption and guarantees maximum sensing coverage of the entire network and the connection rate of active nodes. Simulation results further verify the effectiveness of the proposed algorithm.


2013 ◽  
Vol 339 ◽  
pp. 195-198
Author(s):  
Wei Guo Wang ◽  
Xiao Lei Li

Security issue of sensor networks is greatly different from that of conventional networks. In this paper, the characteristics analysis of wireless sensor network (WSN) has been carried out firstly, through analysis, the security architecture of sensor networks is proposed, trying to outline a general illustration on this area, and then security defense on the wireless sensor network security issues has been implemented secondly, finally the pairwise keying algorithm has been described and analyzed ,from above all, the ultimate security solution of wireless sensor network has been proposed.


2011 ◽  
Vol 20 (06) ◽  
pp. 1051-1066 ◽  
Author(s):  
LINFENG LIU

Underwater sensor networks will find many oceanic applications in near future, and the deployment problem in 3D sensor networks has not been paid enough attention at present. In order to maximize the network lifetime, a deployment algorithm (UDA) for underwater sensor networks in ocean environment is proposed. UDA can determine and select the best cluster shape, then partition the space into layers and clusters while maintaining full coverage and full connectivity. In addition, nodes closer to sinks are possible to bear a heavier data-relaying mission. UDA sets different node deployment densities at different layers in response to the potential relay discrepancy. The simulation results suggest UDA can choose the proper cluster shape to get the maximum underwater wireless sensor network lifetime approximately.


2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Irfan Ahmad ◽  
Taj Rahman ◽  
Asim Zeb ◽  
Inayat Khan ◽  
Inam Ullah ◽  
...  

Underwater Wireless Sensor Networks (UWSN) have gained more attention from researchers in recent years due to their advancement in marine monitoring, deployment of various applications, and ocean surveillance. The UWSN is an attractive field for both researchers and the industrial side. Due to the harsh underwater environment, own capabilities, and open acoustic channel, it is also vulnerable to malicious attacks and threats. Attackers can easily take advantage of these characteristics to steal the data between the source and destination. Many review articles are addressed some of the security attacks and taxonomy of the Underwater Wireless Sensor Networks. In this study, we have briefly addressed the taxonomy of the UWSNs from the most recent research articles related to the well-known research databases. This paper also discussed the security threats on each layer of the Underwater Wireless sensor networks. This study will help the researchers design the routing protocols to cover the known security threats and help industries manufacture the devices to observe these threats and security issues.


2018 ◽  
Vol 7 (2.32) ◽  
pp. 136 ◽  
Author(s):  
Riaz Shaik ◽  
Shaik Shakeel Ahamad

Wireless sensor networks are becoming part of many of the research areas to address different issues related to technological and societal. So, The developments in wireless communication technology have made the deployment of  wireless sensor nodes connected through wireless medium, known as wireless sensor networks. Wireless sensor networks have numerous applications in many fields like military , environmental monitoring , health , industry etc.. wireless sensor networks have more benefits over Wired networks .Though there are several advantages of wireless networks, they are prone to security issues. . Security became a major concern for wireless sensor networks because of the wider application. So ,this paper addresses the critical security issues of wireless sensor networks that may encounter in the different layers of the communication protocols like OSI.This paper presents a detailed review on the security issues and its challenges of the wireless sensor networks.  


Underwater sensor network finds lot of applications in sea environment monitoring. Tsunami like conditions can be monitored and reported earlier so that people on shores can be safe. Due to nature of medium, the data delivery ratio in under water sensor networks is very low. The various problems in the underwater sensor networks are crucial delay, Double side spreading, multipath induced fading, bandwidth limitation, Doppler effects. These problems reduce the data delivery ratio, network lifetime and other parameters.In order to increase the performance of the underwater communication system,Reed Solomon encoding technique with hybrid cross layer methodis used in physical, data link and routing layer . The proposed method increase the reliability of underwater wireless sensor networks.


Author(s):  
Mamta Bachani ◽  
Ahsan Memon ◽  
Faisal Karim Shaikh

This chapter aims to develop an understanding of sensor networks and the security threats posed to them, owing to the inherently insecure wireless nature. It also highlights the current security issues associated with the exchange of information and presents respective countermeasures that can be used to secure the network of malevolent behavior. It builds the reader's understanding of security threats by presenting an idealistic security mechanism and comparing it to currently practiced security mechanisms. Doing so, it identifies the security flaws in each mechanism, henceforth, enumerating a list of well-known security attacks that are connected to the respective security flaws. To provide a better understanding of security threats, the security attacks, in general, are discussed in the perspective of a network administrator, and an adversary. Their impact is also considered from the side of a network administrator and its respective benefits to the adversary. The chapter is later concluded along with future directives and an insight on requirements of forthcoming technologies.


Author(s):  
Vineela Devarashetty ◽  
Jeffrey J.P. Tsai ◽  
Lu Ma ◽  
Du Zhang

A sensor network consists of a large number of sensor nodes, which are spread over a geographical area. Sensor networks have found their way into many applications, from military domains to traffic or environmental monitoring, and as sensor networks reach toward wide spread deployment, security becomes a major concern. In this regard, one needs to be sure about the confidentiality, authenticity and tamper-proof of data. The research thus far has focused on how to deploy sensor networks so that they can work efficiently; however, the focus of this paper is on sensor networks’ security issues. In this paper, the authors propose a formal model to design and analyze the secure sensor network system. The model is based on an augmented Petri net formalism called Extended Elementary Object System. This proposed secure sensor network model has a multi-layered structure consisting of sink node layer, sensor node layer and security mechanism layer. At the security mechanism layer, a synchronous firing mechanism is utilized as a security measure to detect malicious node attacks to sensor data and information flow. In addition, the model applies SNEP protocol for authentication and confidentiality of sensor data.


Sign in / Sign up

Export Citation Format

Share Document