Presenting an Attack-Resistant Communication Model for Secure Routing in Underwater Sensor Networks
Tayebeh Nourali Ahari
1
(
Department of Information Technology Management, Science and Research Branch, Islamic Azad University, Tehran, Iran
)
Mehdi Sadeghzadeh
2
(
Department of Computer Engineering, Science and Research Branch, Islamic Azad University, Tehran, Iran
)
Keywords: Underwater Internet of Things, Safe Neighbor Discovery, Underwater Routing, Wormhole Attack.,
Abstract :
Underwater communication networks face numerous challenges, including routing, signal interference, energy consumption, and security threats. Although routing protocols are optimized for resilience against common disturbances in underwater environments, they are not specifically designed to counter attacks or malicious neighbor nodes. Key security threat factors in underwater sensor networks include limited power sources, constrained communication media, and harsh underwater conditions. Therefore, this research aims to develop a secure communication model resistant to routing attacks in underwater sensor networks. Two communication link models were considered: Scenario 1 uses a basic distance-based model, while Scenario 2 employs a probabilistic channel gain model between node pairs. Simulation results encompass four stages: 1) secure neighbor discovery under wormhole attacks; 2) initial route discovery and selection of reliable nodes for data forwarding to the sink; 3) attack detection during data distribution based on node status information for identifying Sybil attacks; 4) alternative secure path discovery for detecting malicious nodes. The proposed scheme demonstrated higher success rates compared to the basic approach and lower mobility energy costs, achieving comparable success performance.
Limitation of processing and communication capabilities in underwater Internet of Things.
Simulation of guide signal transmission and neighbor table formation in two communication models.
The proposed method demonstrated the highest network throughput compared to the basic method.
[1] B. D. Deebak and F. Al-Turjman, "A hybrid secure routing and monitoring mechanism in IoT-based wireless sensor networks," Ad Hoc Networks, vol. 97, p. 102022, 2020. doi: 10.1016/j.adhoc.2019.102022
[2] S. Nepali, "The Secure and Energy Efficient Data Routing in the IoT-based Network," 2020. doi: 10.1016/J.ADHOC.2019.102022
[3] J. Luo, Y. Chen, M. Wu, and Y. Yang, "A survey of routing protocols for underwater wireless sensor networks," IEEE Commun. Surveys & Tutorials, vol. 23, no. 1, pp. 137-160, 2021. doi: 10.1109/COMST.2020.3048190
[4] S. M. Ghoreyshi, A. Shahrabi, and T. Boutaleb, "Void-handling techniques for routing protocols in underwater sensor networks: Survey and challenges," IEEE Commun. Surveys & Tutorials, vol. 19, no. 2, pp. 800-827, 2017. doi: 10.1109/COMST.2017.2657881.
[5] D. J. Jakubisin, C. McPeak, J. Sloop, and B. Davis, "Securing route discovery for the underwater Internet of Things," OCEANS 2022, Hampton Roads, pp. 1-10, Oct. 2022. doi: 10.1109/OCEANS47191.2022.9977183.
[6] S. M. Ghoreyshi, A. Shahrabi, and T. Boutaleb, "A novel cooperative opportunistic routing scheme for underwater sensor networks," Sensors, vol. 16, no. 3, p. 297, 2016. doi: 10.3390/S16030297
[7] H. Kaushal and G. Kaddoum, "Underwater optical wireless communication," IEEE Access, vol. 4, pp. 1518-1547, 2016. doi: 10.1109/ACCESS.2016.2552538
[8] G. Yang, L. Dai, and Z. Wei, "Challenges, threats, security issues, and new trends of underwater wireless sensor networks," Sensors, vol. 18, no. 11, p. 3907, 2018. doi: 10.3390/S18113907
[9] G. Han, J. Jiang, N. Sun, and L. Shu, "Secure communication for underwater acoustic sensor networks," IEEE Commun. Mag., vol. 53, no. 8, pp. 54-60, 2015. doi: 10.1109/MCOM.2015.7180508
[10] M. C. Domingo, "Securing underwater wireless communication networks," IEEE Wireless Commun., vol. 18, no. 1, pp. 22-28, 2011. doi: 10.1109/MWC.2011.5714022
[11] A. G. Yisa, T. Dargahi, S. Belguith, and M. Hammoudeh, "Security challenges of internet of underwater things: A systematic literature review," Trans. Emerg. Telecommun. Technol., vol. 32, no. 3, p. e4203, 2021. doi: 10.1002/ETT.4203
[12] H. H. Rizvi, R. N. Enam, S. A. Khan, and J. Akram, "A survey on internet of underwater things: Perspective on protocol design for routing," 2020 Global Conf. on Wireless and Optical Technologies (GCWOT), pp. 1-8, Oct. 2020. doi: 10.1109/GCWOT49901.2020.9391628
[13] N. Javaid, S. Cheema, M. Akbar, N. Alrajeh, M. S. Alabed, and N. Guizani, "Balanced energy consumption-based adaptive routing for IoT enabling underwater WSNs," IEEE Access, vol. 5, pp. 10040-10051, 2017. doi: 10.1109/ACCESS.2017.2706741.
[14] S. M. Ghoreyshi, A. Shahrabi, and T. Boutaleb, "An inherently void avoidance routing protocol for underwater sensor networks," 2015 International Symposium on Wireless Communication Systems (ISWCS), pp. 361-365, Aug. 2015. doi: 10.1109/ISWCS.2015.7454364
[15] Y. Noh, U. Lee, P. Wang, B. S. C. Choi, and M. Gerla, "VAPR: Void-aware pressure routing for underwater sensor networks," IEEE Trans. Mobile Comput., vol. 12, no. 5, pp. 895-908, 2012. doi: 10.1109/TMC.2012.53
[16] R. Zhang and Y. Zhang, "Wormhole-resilient secure neighbor discovery in underwater acoustic networks," 2010 Proceedings IEEE INFOCOM, pp. 1-9, Mar. 2010. doi: 10.1109/INFCOM.2010.5462093
[17] F. Jan, N. Min-Allah, and D. Düştegör, "IoT-based smart water quality monitoring: Recent techniques, trends, and challenges for domestic applications," Water, vol. 13, no. 13, p. 1729, 2021. doi: 10.3390/W13131729
[18] N. Adam, M. Ali, F. Naeem, A. S. Ghazy, and G. Kaddoum, "A comprehensive survey of security schemes and privacy-preserving techniques for the internet of underwater things," Communications, vol. 1, no. 2, 2024. doi: 10.36227/TECHRXIV.171502698.82158311
[19] V. G. Menon and P. J. Prathap, "Comparative analysis of opportunistic routing protocols for underwater acoustic sensor networks," 2016 International Conference on Emerging Technological Trends (ICETT), pp. 1-5, Oct. 2016. doi: 10.1109/ICETT.2016.7873733
[20] M. T. Kheirabadi and M. M. Mohamad, "Greedy routing in underwater acoustic sensor networks: a survey," Int. J. Distrib. Sens. Netw., vol. 9, no. 7, p. 701834, 2013. doi: 10.1155/2013/701834
[21] M. Chaudhary, N. Goyal, and A. Mushtaq, "Internet of underwater things: challenges, routing protocols, and ML algorithms," Machine Learning Paradigm for Internet of Things Applications, pp. 247-263, 2022. doi: 10.1002/9781119763499.CH13
[22] E. C. Liou, C. C. Kao, C. H. Chang, Y. S. Lin, and C. J. Huang, "Internet of underwater things: Challenges and routing protocols," 2018 IEEE International Conference on Applied System Invention (ICASI), pp. 1171-1174, Apr. 2018. doi: 10.1109/ICASI.2018.8394494
[23] S. M. Ghoreyshi, A. Shahrabi, and T. Boutaleb, "A stateless opportunistic routing protocol for underwater sensor networks," Wireless Commun. Mob. Comput., vol. 2018, p. 8237351, 2018. doi: 10.1155/2018/8237351
[24] P. Qarabaqi and M. Stojanovic, "Modeling the large-scale transmission loss in underwater acoustic channels," 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton), pp. 445-452, Sep. 2011. doi: 10.1109/ALLERTON.2011.6120201.
[25] R. Bu, S. Wang, and H. Wang, "Fuzzy logic vector-based forwarding routing protocol for underwater acoustic sensor networks," Trans. Emerg. Telecommun. Technol., vol. 29, no. 3, p. e3252, 2018. doi: 10.1002/ETT.3252.
[26] N. Nicolaou, A. See, P. Xie, J. H. Cui, and D. Maggiorini, "Improving the robustness of location-based routing for underwater sensor networks," Oceans 2007-Europe, pp. 1-6, Jun. 2007. doi: 10.1109/OCEANSE.2007.4302470.
[27] P. Xie, J. H. Cui, and L. Lao, "VBF: Vector-based forwarding protocol for underwater sensor networks," NETWORKING 2006. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems: 5th International IFIP-TC6 Networking Conference, Coimbra, Portugal, May 15-19, 2006, Proc., vol. 5, pp. 1216-1221. Springer Berlin Heidelberg. doi: 10.1007/11753810_111
[28] Z. Wang, G. Han, H. Qin, S. Zhang, and Y. Sui, "An energy-aware and void-avoidable routing protocol for underwater sensor networks," IEEE Access, vol. 6, pp. 7792-7801, 2018. doi: 10.1109/ACCESS.2018.2805804
[29] Z. L. Li, N. M. Yao, and Q. Gao, "Relative distance-based forwarding protocol for underwater wireless sensor networks," Applied Mechanics and Materials, vol. 437, pp. 655-658, 2013. doi: 10.4028/WWW.SCIENTIFIC.NET/AMM.437.655
[30] R. W. Coutinho, A. Boukerche, L. F. Vieira, and A. A. Loureiro, "Geographic and opportunistic routing for underwater sensor networks," IEEE Trans. Comput., vol. 65, no. 2, pp. 548-561, 2015. doi: 10.1109/TC.2015.2423677
[31] K. Saeed, W. Khalil, S. Ahmed, I. Ahmad, and M. N. K. Khattak, "SEECR: Secure energy efficient and cooperative routing protocol for underwater wireless sensor networks," IEEE Access, vol. 8, pp. 107419-107433, 2020. doi: 10.1109/ACCESS.2020.3000863
[32] F. Ahmed, Z. Wadud, N. Javaid, N. Alrajeh, M. S. Alabed, and U. Qasim, "Mobile sinks assisted geographic and opportunistic routing-based interference avoidance for underwater wireless sensor networks," Sensors, vol. 18, no. 4, p. 1062, 2018. doi: 10.3390/S18041062
[33] U. Ullah, A. Khan, S. M. Altowaijri, I. Ali, A. U. Rahman, V. V. Kumar, ... and H. Mahmood, "Cooperative and delay minimization routing schemes for dense underwater wireless sensor networks," Symmetry, vol. 11, no. 2, p. 195, 2019. doi: 10.3390/SYM11020195.