skip to main content
10.1145/3366486.3366516acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
short-paper

Prolonging the Lifetime of Underwater Sensor Networks Under Sinkhole Attacks

Authors Info & Claims
Published:13 February 2020Publication History

ABSTRACT

Severe characteristics and convergecast nature of underwater acoustic channels make underwater sensor networks (USNs) vulnerable to malicious attacks. One of the most malicious attacks in USNs is the sinkhole attack, where an adversary first captures a sensor node and then lures the surrounding network traffic by using false routing information. Later, the captured node can forward the captured network traffic to the intruder or drop the packets. Sinkhole attacks negatively affect the lifetime, end-to-end latency, and energy-efficiency of USNs since lured nodes spend energy in an unbalanced manner and the forwarding process introduces additional latency. In this work, we investigate the lifetime, end-to-end latency, and energy consumption performances of USNs under sinkhole attacks within an integer programming (IP) model which maximizes USNs lifetime. Our results show that if half of the nodes in the network are lured by a sinkhole node, the network lifetime decreases at a minimum of 71%; the end-to-end latency and energy consumption are increased at least by 89% and 77% as compared to the performance metrics which are obtained in the case of no sinkhole attacks.

References

  1. Ian F Akyildiz, Dario Pompili, and Tommaso Melodia. 2005. Underwater acoustic sensor networks: research challenges. Ad Hoc Networks 3, 3 (2005), 257--279.Google ScholarGoogle Scholar
  2. Angelo Capossele, Gianluca De Cicco, and Chiara Petrioli. 2015. R-CARP: A reputation based channel aware routing protocol for underwater acoustic sensor networks. In Proc. International Conference on Underwater Networks & Systems (WUWNET). Article 37, 6 pages.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Yanping Cong, Guang Yang, Zhiqiang Wei, and Wei Zhou. 2010. Security in underwater sensor network. In Proc. International Conference on Communications and Mobile Computing, Vol. 1. 162--168.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Anjana P Das and Sabu M Thampi. 2015. Secure communication in mobile underwater wireless sensor networks. In Proc. International Conference on Advances in Computing, Communications and Informatics (ICACCI). 2164--2173.Google ScholarGoogle ScholarCross RefCross Ref
  5. Mari Carmen Domingo. 2011. Securing underwater wireless communication networks. IEEE Wireless Communications 18, 1 (2011), 22--28.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Lee Freitag, Matthew Grund, Sandipa Singh, James Partan, Peter Koski, and Keenan Ball. 2005. The WHOI micro-modem: an acoustic communications and navigation system for multiple platforms. In Proc. MTS/IEEE OCEANS, Vol. 2. 1086--1092.Google ScholarGoogle Scholar
  7. Guangjie Han, Jinfang Jiang, Lei Shu, and Mohsen Guizani. 2015. An attack-resistant trust model based on multidimensional trust metrics in underwater acoustic sensor network. IEEE Transactions on Mobile Computing 14, 12 (2015), 2447--2459.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Guangjie Han, Jinfang Jiang, Ning Sun, and Lei Shu. 2015. Secure communication for underwater acoustic sensor networks. IEEE Communications Magazine 53, 8 (2015), 54--60.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Jawaad Ullah Khan and Ho-Shin Cho. 2014. A data gathering protocol using AUV in underwater sensor networks. In Proc. OCEANS - TAIPEI. 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  10. Jiejun Kong, Zhengrong Ji, Weichao Wang, Mario Gerla, Rajive Bagrodia, and Bharat Bhargava. 2005. Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks. In Proc. ACM Workshop on Wireless Security (WiSe). 87--96.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Robert Martin and Sanguthevar Rajasekaran. 2016. Data centric approach to analyzing security threats in underwater sensor networks. In Proc. MTS/IEEE OCEANS Monterey. 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  12. Edith CH Ngai, Jiangchuan Liu, and Michael R Lyu. 2007. An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks. Computer Communications 30, 11 (2007), 2353--2364.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Milica Stojanovic. 2006. On the relationship between capacity and distance in an underwater acoustic communication channel. In Proc. ACM International Workshop on Underwater Networks (WUWNet). 41--47.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Mohammad Wazid, Ashok Kumar Das, Saru Kumari, and Muhammad Khurram Khan. 2016. Design of sinkhole node detection mechanism for hierarchical wireless sensor networks. Security and Communication Networks 9, 17 (2016), 4596--4614.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Michael Zuba, Zhijie Shi, Zheng Peng, and Jun-Hong Cui. 2011. Launching denial-of-service jamming attacks in underwater sensor networks. In Proc. ACM International Workshop on Underwater Networks (WUWNet). Article 12, 5 pages.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Prolonging the Lifetime of Underwater Sensor Networks Under Sinkhole Attacks

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Other conferences
                WUWNet '19: Proceedings of the 14th International Conference on Underwater Networks & Systems
                October 2019
                210 pages
                ISBN:9781450377409
                DOI:10.1145/3366486

                Copyright © 2019 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 13 February 2020

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • short-paper
                • Research
                • Refereed limited

                Acceptance Rates

                Overall Acceptance Rate84of180submissions,47%

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader