Presenting an Attack-Resistant Communication Model for Secure Routing in Underwater Sensor Networks
Tayebeh Nourali Ahari
1
(
Department of Information Technology Management, Science and Research Branch, Islamic Azad University, Tehran, Iran
)
Mehdi Sadeghzadeh
2
(
Department of Computer Engineering, Science and Research Branch, Islamic Azad University, Tehran, Iran
)
Keywords: Underwater Internet of Things, Safe Neighbor Discovery, Underwater Routing, Wormhole Attack.,
Abstract :
Underwater communication networks face various challenges including packet routing, signal interference, energy consumption, and potential network attacks. While routing protocols are designed to withstand common disturbances in underwater environments, they are not specifically crafted to counteract potential attacks and malicious behavior by neighboring nodes. The primary factors contributing to security threats in underwater wireless sensor networks (UWSNs) include limited power supply, restricted communication media, and harsh underwater communication conditions.Therefore, this research aims to provide a communication model that is resistant to secure routing attacks in underwater sensor networks. For this purpose, two models were considered for communication links between each pair of nodes. Scenario 1 is a basic distance-based model. In the second scenario, a probabilistic channel gain model was used between each pair of nodes. The simulation results include four steps: 1)secure neighbor discovery under wormhole attacks in underwater sensor networks, 2) initial path discovery process that selects the next reliable forwarding node to the sink node, 3) attack detection process while distributing data based on state information Nodes to detect Sybil attack (Sybil) and 4) safe path discovery is an alternative to detect malicious nodes, showed that the proposed scheme achieved a better success rate than the basic scheme and achieved lower mobility energy cost than the original method. It has achieved a comparable degree of success.
Limitation of processing and communication capabilities in underwater Internet of Things.
Simulation of guide signal transmission and neighbor table formation in two communication models.
The proposed method demonstrated the highest network throughput compared to the basic method.
[1] aniel J. Jakubisin, Connor McPeak, Jamie Sloop, Securing Route Discovery for the Underwater Inte-
rnet of Things. Bradley Davis Hume Center for National Security and Technology Virginia Tech National Security Institute, Blacksburg, Conferences OCEANS 2022.
[2] Deebak, B. D., & Al-Turjman, F. (2020). A hybrid secure routing and monitoring mechanism in IoT-based wireless sensor networks. Ad Hoc Networks, 97, 102022
[3] Nepali, S. (2020). The Secure and Energy Efficient Data Routing in the IoT based Network.
[4] J. Luo, Y. Chen, M. Wu, and Y. Yang, “A survey of routing protocols for underwater wireless sensor networks,” IEEE Communications Surveys & Tutorials, vol. 23, no. 1, pp. 137–160, 2021.
[5] S. M. Ghoreyshi, A. Shahrabi, and T. Boutaleb, “Void-handling techniques for routing protocols in underwater sensor networks: Survey and challenges,” IEEE Communications Surveys & Tutorials, vol. 19, no. 2, pp. 800–827, Secondquarter 2017.
[6] S. Ghoreyshi, A. Shahrabi, and T. Boutaleb, “A novel cooperative opportunistic routing scheme for underwater sensor networks,” Sensors, vol. 16, no. 3, p. 297, Feb. 2016.
[7] G. Han, J. Jiang, N. Sun, and L. Shu, “Secure communication for underwater acoustic sensor networks,” IEEE Communications Magazine, vol. 53, no. 8, pp. 54–60, Aug. 2015.
[8] G. Yang, L. Dai, and Z. Wei, “Challenges, threats, security issues and new trends of underwater wireless sensor networks,” Sensors, vol. 18, no. 11, p. 3907, Nov. 2018.
[9] H. Kaushal and G. Kaddoum, “Underwater optical wireless communication,” IEEE Access, vol. 4, pp. 1518–1547, 2016.
[10] H. H. Rizvi, R. N. Enam, S. A. Khan, and J. Akram, “A survey on internet of underwater things: Perspective on protocol design for routing,” in 2020 Global Conference on Wireless and Optical Technologies (GCWOT). IEEE, Oct. 2020, pp. 1–8.
[11] V. G. Menon and P. M. J. Prathap, “Comparative analysis of opportunistic routing protocols for underwater acoustic sensor networks,” in 2016 International Conference on Emerging Technological Trends (ICETT). IEEE, Oct. 2016.
[12] M. T. Kheirabadi and M. M. Mohamad, “Greedy routing in underwater acoustic sensor networks: A survey,” International Journal of Distributed Sensor Networks, vol. 9, no. 7, Jul. 2013.
[13] M. Chaudhary, N. Goyal, and A. Mushtaq, Internet of Underwater Things: Challenges, Routing Protocols, and ML Algorithms. John Wiley & Sons, Ltd, 2022, ch. 13, pp. 247–263. [Online]. Available: https://onlinelibrary.wiley.com/doi/abs/10.1002/9781119763499.ch13
[14] E.-C. Liou, C.-C. Kao, C.-H. Chang, Y.-S. Lin, and C.-J. Huang, “Internet of underwater things: Challenges and routing protocols,” in 2018 IEEE international conference on applied system invention (ICASI). IEEE, 2018, pp. 1171–1174.
[15] S. M. Ghoreyshi, A. Shahrabi, and T. Boutaleb, “A stateless opportunistic routing protocol for underwater sensor networks,” Wireless Communications and Mobile Computing, vol. 2018, pp. 1–18, Nov. 2018.
[16] S. M. Ghoreyshi, A. Shahrabi, and T. Boutaleb, “An inherently void avoidance routing protocol for underwater sensor networks,” in 2015 International Symposium on Wireless Communication Systems (ISWCS), Aug. 2015, pp. 361–365.
[17] N. Javaid, S. Cheema, M. Akbar, N. Alrajeh, M. S. Alabed, and N. Guizani, “Balanced energy consumption based adaptive routing for IoT enabling underwater WSNs,” IEEE Access, vol. 5, pp. 10 040– 10 051, 2017.
[18] Y. Noh, U. Lee, P. Wang, B. S. C. Choi, and M. Gerla, “VAPR: Void-aware pressure routing for underwater sensor networks,” IEEE Transactions on Mobile Computing, vol. 12, no. 5, pp. 895–908, May 2013.
[19] M. Domingo, “Securing underwater wireless communication networks,” IEEE Wireless Communications, vol. 18, no. 1, pp. 22–28, Feb. 2011.
[20] R. Zhang and Y. Zhang, “Wormhole-resilient secure neighbor discovery in underwater acoustic networks,” in 2010 Proceedings IEEE INFOCOM, 2010, pp. 1–9.
[21] P. Qarabaqi and M. Stojanovic, “Modeling the large scale transmission loss in underwater acoustic channels,” in 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2011, pp. 445–452.