A secure routing scheme for underwater acoustic networks

@article{Du2017ASR,
  title={A secure routing scheme for underwater acoustic networks},
  author={Xiujuan Du and Chunyan Peng and Keqin Li},
  journal={International Journal of Distributed Sensor Networks},
  year={2017},
  volume={13}
}
Secure and anonymous routing is required in many underwater acoustic network applications such as marine military. However, the characteristics of underwater acoustic networks cause existing secure scheme designed for traditional terrestrial networks to be inapplicable. This article presents a secure routing design for underwater acoustic networks. First, considering the difficulty of setting a trusted third party in underwater acoustic networks, a short signature algorithm without any online… 
A Secure Remote Mutual Authentication Scheme Based on Chaotic Map for Underwater Acoustic Networks
TLDR
This paper presents a chaotic maps remote user authentication and key agreement scheme for underwater acoustic networks based on the DLP and DHP, in which only authenticated users have rights to obtain the information.
A Secure Routing Algorithm for Underwater Wireless Sensor Networks
  • S. M. Jameii
  • Computer Science
    International Journal of Engineering
  • 2018
TLDR
A new secure routing algorithm called Secure Routing Algorithm for Underwater (SRAU) sensor networks is proposed to resist against wormhole and sybil attacks and indicates acceptable performance.
A Survey on the Security of Routing Protocols for Underwater Acoustic Sensor Networks
TLDR
A comprehensive survey on the security of routing protocols in UASNs is presented and the existing attack-resilient routing protocol schemes are compared in terms of their capability to address security requirements and attacks, merits and limitations, mobility, and performance metrics.
Secure Routing in OFDM based Multi-Hop Underwater Acoustic Sensor Networks
TLDR
This work performs joint optimal node selection for data forwarding and sub-carrier power allocation to maximize the secrecy capacity on each hop and compares the performance of the proposed scheme with the classical depth-based routing (DBR) scheme in simulations.
SAPDA: Secure Authentication with Protected Data Aggregation Scheme for Improving QoS in Scalable and Survivable UWSNs
TLDR
A secure authentication and protected data aggregation method for the cluster based structure of UWSN is proposed as because cluster based arrangement produces a concise and stable network and improves the data reliability in the network by reducing the energy consumption and delay.
SEECR: Secure Energy Efficient and Cooperative Routing Protocol for Underwater Wireless Sensor Networks
TLDR
The performance of SEECR is compared with AMCTD: Adaptive Mobility of Courier Nodes in Threshold-optimized DBR - a well-known routing protocol for UWSNs environment and it is observed that attack significantly degrades the performance ofAMCTD whereas due to the embedded defense mechanism in SEECC the impact of attack is negligible.
Fair Authentic Acoustic Network Grouping
TLDR
A scheme is proposed which includes not only intrusion prevention but also intrusion tolerance to some degree, called Fair Authentic Acoustic Network Grouping (FAANG), which combines existing trust mechanisms with existing digital signature schemes to harness the most effective aspects of each.
Trust Management in Underwater Acoustic MANETs based on Cloud Theory using Multi-Parameter Metrics
TLDR
This work proposes a trust model to defend underwater acoustic MANETs against attacks using a machine learning method with carefully chosen communication metrics, and a cloud model to address the uncertainty of trust in harsh underwater environments.
Maximizing secrecy rate of an orthogonal frequency division multiplexing‐based multihop underwater acoustic sensor network
TLDR
This work proposes various (optimal and suboptimal) methods for providing information‐theoretic security at the physical layer of the protocol stack through resource allocation.
Security of Underwater and Air-Water Wireless Communication
TLDR
A detailed literature review of the various kinds of active and passive attacks which hamper the confidentiality, integrity, authentication and availability of both underwater and A-W WCNs is provided.
...
...

References

SHOWING 1-10 OF 21 REFERENCES
Security in Underwater Acoustic Sensor Network: Focus on Suitable Encryption Mechanisms
TLDR
The requirements and security issues of UWASNs are considered, and applicable security algorithms that are suitable for UWASN are discussed.
Wormhole-Resilient Secure Neighbor Discovery in Underwater Acoustic Networks
TLDR
A suite of novel protocols to enable wormhole-resilient secure neighbor discovery in UANs that can thwart the wormhole attack with overwhelming probability without conventional hard requirements on secure and accurate time synchronization and localization.
An Ultra-Lightweight Encryption Scheme in Underwater Acoustic Networks
TLDR
This paper presents a lightweight, 8-round iteration block cipher algorithm for UANs communication based on chaotic theory and increases the key space by changing the number of iteration round to resist brute-force searches and adversarial attacks.
Secure underwater acoustic communication based on a robust key generation scheme
TLDR
This paper presents a novel key generation system which is easy to be implemented, efficient in computation and communication, and robust to the spatio-temporal variable ocean environments.
RSS-based secret key generation in underwater acoustic networks: advantages, challenges, and performance improvements
TLDR
An overview of the advantages and major challenges from the unique features of underwater systems through experiment results of sea trails are provided and viable solutions to improve the performance of RSS-based key generation in oceans are discussed.
Security in Underwater Sensor Network
TLDR
It is argued that layered security schemes cannot protect UWSN against blended attacks, and a novel preliminary conceive is presented, which is a cross-layer, adaptive, selective security scheme.
A cryptographic suite for underwater cooperative applications
  • G. Dini, A. L. Duca
  • Computer Science
    2011 IEEE Symposium on Computers and Communications (ISCC)
  • 2011
TLDR
This paper proposes a cryptographic suite able to reduce at the minimum the message overhead added by security, which provides vehicles authentication, confidentiality and integrity of messages and key management.
Security Considerations of Underwater Acoustic Networks
TLDR
The characteristics of UAN are analyzed firstly, and comparisons between the common-used networks are performed, and the security threats are classified according to their harm to UAN, and corresponding countermeasures against them are taken into considerations.
Securing underwater wireless communication networks
  • M. Domingo
  • Computer Science
    IEEE Wireless Communications
  • 2011
TLDR
In this article, a complete survey of security for UWCNs is presented, and the research challenges for secure communication in this environment are outlined.
An Efficient and Reliable Geographic Routing Protocol Based on Partial Network Coding for Underwater Sensor Networks
TLDR
GPNC is presented, a novel geographic routing protocol for UWSNs that incorporates partial network coding to encode data packets and uses sensor nodes’ location information to greedily forward data packets to sink nodes.
...
...