Presenting an Attack-Resistant Communication Model for Secure Routing in Underwater Sensor Networks
Tayebeh Nourali Ahari
1
(
Department of Information Technology Management, Science and Research Branch, Islamic Azad University, Tehran, Iran
)
Mehdi Sadeghzadeh
2
(
Department of Computer Engineering, Science and Research Branch, Islamic Azad University, Tehran, Iran
)
Keywords: Underwater Internet of Things, Safe Neighbor Discovery, Underwater Routing, Wormhole Attack.,
Abstract :
Underwater communication networks face numerous challenges, including routing, signal interference, energy consumption, and security threats. Although routing protocols are optimized for resilience against common disturbances in underwater environments, they are not specifically designed to counter attacks or malicious neighbor nodes. Key security threat factors in underwater sensor networks include limited power sources, constrained communication media, and harsh underwater conditions. Therefore, this research aims to develop a secure communication model resistant to routing attacks in underwater sensor networks. Two communication link models were considered: Scenario 1 uses a basic distance-based model, while Scenario 2 employs a probabilistic channel gain model between node pairs. Simulation results encompass four stages: 1) secure neighbor discovery under wormhole attacks; 2) initial route discovery and selection of reliable nodes for data forwarding to the sink; 3) attack detection during data distribution based on node status information for identifying Sybil attacks; 4) alternative secure path discovery for detecting malicious nodes. The proposed scheme demonstrated higher success rates compared to the basic approach and lower mobility energy costs, achieving comparable success performance.
Limitation of processing and communication capabilities in underwater Internet of Things.
Simulation of guide signal transmission and neighbor table formation in two communication models.
The proposed method demonstrated the highest network throughput compared to the basic method.
[1] aniel J. Jakubisin, Connor McPeak, Jamie Sloop, Securing Route Discovery for the Underwater Inte-
rnet of Things. Bradley Davis Hume Center for National Security and Technology Virginia Tech National Security Institute, Blacksburg, Conferences OCEANS 2022.
[2] Deebak, B. D., & Al-Turjman, F. (2020). A hybrid secure routing and monitoring mechanism in IoT-based wireless sensor networks. Ad Hoc Networks, 97, 102022
[3] Nepali, S. (2020). The Secure and Energy Efficient Data Routing in the IoT based Network.
[4] J. Luo, Y. Chen, M. Wu, and Y. Yang, “A survey of routing protocols for underwater wireless sensor networks,” IEEE Communications Surveys & Tutorials, vol. 23, no. 1, pp. 137–160, 2021.
[5] S. M. Ghoreyshi, A. Shahrabi, and T. Boutaleb, “Void-handling techniques for routing protocols in underwater sensor networks: Survey and challenges,” IEEE Communications Surveys & Tutorials, vol. 19, no. 2, pp. 800–827, Secondquarter 2017.
[6] S. Ghoreyshi, A. Shahrabi, and T. Boutaleb, “A novel cooperative opportunistic routing scheme for underwater sensor networks,” Sensors, vol. 16, no. 3, p. 297, Feb. 2016.
[7] G. Han, J. Jiang, N. Sun, and L. Shu, “Secure communication for underwater acoustic sensor networks,” IEEE Communications Magazine, vol. 53, no. 8, pp. 54–60, Aug. 2015.
[8] G. Yang, L. Dai, and Z. Wei, “Challenges, threats, security issues and new trends of underwater wireless sensor networks,” Sensors, vol. 18, no. 11, p. 3907, Nov. 2018.
[9] H. Kaushal and G. Kaddoum, “Underwater optical wireless communication,” IEEE Access, vol. 4, pp. 1518–1547, 2016.
[10] H. H. Rizvi, R. N. Enam, S. A. Khan, and J. Akram, “A survey on internet of underwater things: Perspective on protocol design for routing,” in 2020 Global Conference on Wireless and Optical Technologies (GCWOT). IEEE, Oct. 2020, pp. 1–8.
[11] V. G. Menon and P. M. J. Prathap, “Comparative analysis of opportunistic routing protocols for underwater acoustic sensor networks,” in 2016 International Conference on Emerging Technological Trends (ICETT). IEEE, Oct. 2016.
[12] M. T. Kheirabadi and M. M. Mohamad, “Greedy routing in underwater acoustic sensor networks: A survey,” International Journal of Distributed Sensor Networks, vol. 9, no. 7, Jul. 2013.
[13] M. Chaudhary, N. Goyal, and A. Mushtaq, Internet of Underwater Things: Challenges, Routing Protocols, and ML Algorithms. John Wiley & Sons, Ltd, 2022, ch. 13, pp. 247–263. [Online]. Available: https://onlinelibrary.wiley.com/doi/abs/10.1002/9781119763499.ch13
[14] E.-C. Liou, C.-C. Kao, C.-H. Chang, Y.-S. Lin, and C.-J. Huang, “Internet of underwater things: Challenges and routing protocols,” in 2018 IEEE international conference on applied system invention (ICASI). IEEE, 2018, pp. 1171–1174.
[15] S. M. Ghoreyshi, A. Shahrabi, and T. Boutaleb, “A stateless opportunistic routing protocol for underwater sensor networks,” Wireless Communications and Mobile Computing, vol. 2018, pp. 1–18, Nov. 2018.
[16] S. M. Ghoreyshi, A. Shahrabi, and T. Boutaleb, “An inherently void avoidance routing protocol for underwater sensor networks,” in 2015 International Symposium on Wireless Communication Systems (ISWCS), Aug. 2015, pp. 361–365.
[17] N. Javaid, S. Cheema, M. Akbar, N. Alrajeh, M. S. Alabed, and N. Guizani, “Balanced energy consumption based adaptive routing for IoT enabling underwater WSNs,” IEEE Access, vol. 5, pp. 10 040– 10 051, 2017.
[18] Y. Noh, U. Lee, P. Wang, B. S. C. Choi, and M. Gerla, “VAPR: Void-aware pressure routing for underwater sensor networks,” IEEE Transactions on Mobile Computing, vol. 12, no. 5, pp. 895–908, May 2013.
[19] M. Domingo, “Securing underwater wireless communication networks,” IEEE Wireless Communications, vol. 18, no. 1, pp. 22–28, Feb. 2011.
[20] R. Zhang and Y. Zhang, “Wormhole-resilient secure neighbor discovery in underwater acoustic networks,” in 2010 Proceedings IEEE INFOCOM, 2010, pp. 1–9.
[21] P. Qarabaqi and M. Stojanovic, “Modeling the large scale transmission loss in underwater acoustic channels,” in 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2011, pp. 445–452.