ABSTRACT
Severe characteristics and convergecast nature of underwater acoustic channels make underwater sensor networks (USNs) vulnerable to malicious attacks. One of the most malicious attacks in USNs is the sinkhole attack, where an adversary first captures a sensor node and then lures the surrounding network traffic by using false routing information. Later, the captured node can forward the captured network traffic to the intruder or drop the packets. Sinkhole attacks negatively affect the lifetime, end-to-end latency, and energy-efficiency of USNs since lured nodes spend energy in an unbalanced manner and the forwarding process introduces additional latency. In this work, we investigate the lifetime, end-to-end latency, and energy consumption performances of USNs under sinkhole attacks within an integer programming (IP) model which maximizes USNs lifetime. Our results show that if half of the nodes in the network are lured by a sinkhole node, the network lifetime decreases at a minimum of 71%; the end-to-end latency and energy consumption are increased at least by 89% and 77% as compared to the performance metrics which are obtained in the case of no sinkhole attacks.
- Ian F Akyildiz, Dario Pompili, and Tommaso Melodia. 2005. Underwater acoustic sensor networks: research challenges. Ad Hoc Networks 3, 3 (2005), 257--279.Google Scholar
- Angelo Capossele, Gianluca De Cicco, and Chiara Petrioli. 2015. R-CARP: A reputation based channel aware routing protocol for underwater acoustic sensor networks. In Proc. International Conference on Underwater Networks & Systems (WUWNET). Article 37, 6 pages.Google ScholarDigital Library
- Yanping Cong, Guang Yang, Zhiqiang Wei, and Wei Zhou. 2010. Security in underwater sensor network. In Proc. International Conference on Communications and Mobile Computing, Vol. 1. 162--168.Google ScholarDigital Library
- Anjana P Das and Sabu M Thampi. 2015. Secure communication in mobile underwater wireless sensor networks. In Proc. International Conference on Advances in Computing, Communications and Informatics (ICACCI). 2164--2173.Google ScholarCross Ref
- Mari Carmen Domingo. 2011. Securing underwater wireless communication networks. IEEE Wireless Communications 18, 1 (2011), 22--28.Google ScholarDigital Library
- Lee Freitag, Matthew Grund, Sandipa Singh, James Partan, Peter Koski, and Keenan Ball. 2005. The WHOI micro-modem: an acoustic communications and navigation system for multiple platforms. In Proc. MTS/IEEE OCEANS, Vol. 2. 1086--1092.Google Scholar
- Guangjie Han, Jinfang Jiang, Lei Shu, and Mohsen Guizani. 2015. An attack-resistant trust model based on multidimensional trust metrics in underwater acoustic sensor network. IEEE Transactions on Mobile Computing 14, 12 (2015), 2447--2459.Google ScholarDigital Library
- Guangjie Han, Jinfang Jiang, Ning Sun, and Lei Shu. 2015. Secure communication for underwater acoustic sensor networks. IEEE Communications Magazine 53, 8 (2015), 54--60.Google ScholarDigital Library
- Jawaad Ullah Khan and Ho-Shin Cho. 2014. A data gathering protocol using AUV in underwater sensor networks. In Proc. OCEANS - TAIPEI. 1--6.Google ScholarCross Ref
- Jiejun Kong, Zhengrong Ji, Weichao Wang, Mario Gerla, Rajive Bagrodia, and Bharat Bhargava. 2005. Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks. In Proc. ACM Workshop on Wireless Security (WiSe). 87--96.Google ScholarDigital Library
- Robert Martin and Sanguthevar Rajasekaran. 2016. Data centric approach to analyzing security threats in underwater sensor networks. In Proc. MTS/IEEE OCEANS Monterey. 1--6.Google ScholarCross Ref
- Edith CH Ngai, Jiangchuan Liu, and Michael R Lyu. 2007. An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks. Computer Communications 30, 11 (2007), 2353--2364.Google ScholarDigital Library
- Milica Stojanovic. 2006. On the relationship between capacity and distance in an underwater acoustic communication channel. In Proc. ACM International Workshop on Underwater Networks (WUWNet). 41--47.Google ScholarDigital Library
- Mohammad Wazid, Ashok Kumar Das, Saru Kumari, and Muhammad Khurram Khan. 2016. Design of sinkhole node detection mechanism for hierarchical wireless sensor networks. Security and Communication Networks 9, 17 (2016), 4596--4614.Google ScholarDigital Library
- Michael Zuba, Zhijie Shi, Zheng Peng, and Jun-Hong Cui. 2011. Launching denial-of-service jamming attacks in underwater sensor networks. In Proc. ACM International Workshop on Underwater Networks (WUWNet). Article 12, 5 pages.Google ScholarDigital Library
Index Terms
- Prolonging the Lifetime of Underwater Sensor Networks Under Sinkhole Attacks
Recommendations
Sinkhole Attacks in Wireless Sensor Networks: A Survey
Wireless sensor networks (WSNs) consist of a large number of nodes, communicating sensor readings to the base stations through other nodes. Due to their energy limitations and positioning in hostile environments, WSNs are vulnerable to various routing ...
Joint Sink Mobility and Node Deployment for Prolonging Lifetime in Wireless Sensor Networks
BCGIN '13: Proceedings of the 2013 International Conference on Business Computing and Global InformatizationWhen cluster heads transmit their data to the sink via multi-hop mode, the cluster heads closer to the sink are burdened with heavy relay traffic and tend to die early. In this paper, taking both sink mobility and node deployment into account, we ...
A new cluster head selection scheme for long lifetime of wireless sensor networks
ICCSA'06: Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IVWireless sensor network (WSN) consisting of a large number of small sensors can be an effective tool for gathering information in a variety of environments. Since sensor nodes operate on batteries, energy efficiency is a key issue in designing the ...
Comments