An Investigative Analysis of Underwater Wireless Sensor Network (UWSN) Security

Jibran R. Khan, Shariq Mahmood Khan, F. Siddiqui
{"title":"An Investigative Analysis of Underwater Wireless Sensor Network (UWSN) Security","authors":"Jibran R. Khan, Shariq Mahmood Khan, F. Siddiqui","doi":"10.2174/2210327912666211224105634","DOIUrl":null,"url":null,"abstract":"\n\nThe last few decades bring an astonishing revolution in technology and electronics which enabling small pieces of electronic devices into handy equipment, called sensors. The sensors enable 75% area of the world covered by water. Which is hardly 5% been explored and has numerous applications. The security of underwater wireless sensors network (UWNS) communication is a prime concern to protect advantages from technology and application purpose. This paper explores UWSN architecture, vulnerabilities, attacks, and possible factors that challenge UWSN security and its applications. \n\n\n\nThe primary objective of this work is to analyze the vulnerable factors that cause security challenges and threats to UWSN applications. This study focuses on the intermediate uplink point of UWSN architecture and evaluates it in three different test cases. This would be beneficial to build a better solution by devising an appropriate scheme in the future.\n\n\n\nThe denial of service (DoS) attack is simulated using ns-3 and Aquasim-ng simulator to determine which factor(s) threatening to the UWSN environment. The simulation is performed under three idealized underwater scenarios; 1) depicts general UWSN (a hybrid architecture), 2) a special case depicts UWSN environment with only underwater components, ands 3) depicts another special case with underwater sink UWSN environment. Assuming all three test case environments are vulnerable and threats to UWSN security. \n\n\n\n In all three scenarios, the average network performance in the normal transmission is 88% and about ± 3% deviation is observed. Also, it observed that scenarios 1 and 2 are influenced by the adversary interference or malicious activity while there are no such effects that occur in scenario 3 in the absence of intermediate radio link or surface sink node(s). Thus, experiments found that among others, the intermediate radio link(s) of the onshore surface sink(s) or surface buoy(s) are vulnerable and threats to UWSN.\n\n\n\nThe simulation results and observations found that the intermediate up-link in UWSN architecture found to be more vulnerable which makes it insecure. While, in a pure underwater environment, seem to be more secure compared to the general UWSN environment. In the future, more factors will be evaluate in the same or different cases to determine the UWSN issues and other vulnerable factors\n","PeriodicalId":37686,"journal":{"name":"International Journal of Sensors, Wireless Communications and Control","volume":"113 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2021-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Sensors, Wireless Communications and Control","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2174/2210327912666211224105634","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Mathematics","Score":null,"Total":0}
引用次数: 1

Abstract

The last few decades bring an astonishing revolution in technology and electronics which enabling small pieces of electronic devices into handy equipment, called sensors. The sensors enable 75% area of the world covered by water. Which is hardly 5% been explored and has numerous applications. The security of underwater wireless sensors network (UWNS) communication is a prime concern to protect advantages from technology and application purpose. This paper explores UWSN architecture, vulnerabilities, attacks, and possible factors that challenge UWSN security and its applications. The primary objective of this work is to analyze the vulnerable factors that cause security challenges and threats to UWSN applications. This study focuses on the intermediate uplink point of UWSN architecture and evaluates it in three different test cases. This would be beneficial to build a better solution by devising an appropriate scheme in the future. The denial of service (DoS) attack is simulated using ns-3 and Aquasim-ng simulator to determine which factor(s) threatening to the UWSN environment. The simulation is performed under three idealized underwater scenarios; 1) depicts general UWSN (a hybrid architecture), 2) a special case depicts UWSN environment with only underwater components, ands 3) depicts another special case with underwater sink UWSN environment. Assuming all three test case environments are vulnerable and threats to UWSN security. In all three scenarios, the average network performance in the normal transmission is 88% and about ± 3% deviation is observed. Also, it observed that scenarios 1 and 2 are influenced by the adversary interference or malicious activity while there are no such effects that occur in scenario 3 in the absence of intermediate radio link or surface sink node(s). Thus, experiments found that among others, the intermediate radio link(s) of the onshore surface sink(s) or surface buoy(s) are vulnerable and threats to UWSN. The simulation results and observations found that the intermediate up-link in UWSN architecture found to be more vulnerable which makes it insecure. While, in a pure underwater environment, seem to be more secure compared to the general UWSN environment. In the future, more factors will be evaluate in the same or different cases to determine the UWSN issues and other vulnerable factors
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
水下无线传感器网络(UWSN)安全性研究分析
在过去的几十年里,科技和电子领域发生了一场惊人的革命,使得小型电子设备变成了方便的设备,我们称之为传感器。这些传感器使世界上75%的面积被水覆盖。这还不到5%的人被探索过,而且有很多应用。水下无线传感器网络(UWNS)通信的安全性是保护水下无线传感器网络技术和应用优势的首要问题。本文探讨了UWSN的体系结构、漏洞、攻击以及可能挑战UWSN安全性及其应用的因素。本工作的主要目标是分析导致UWSN应用面临安全挑战和威胁的脆弱因素。本文主要研究了UWSN体系结构的中间上行点,并在三个不同的测试用例中对其进行了评估。这将有助于在将来设计一个合适的方案来构建一个更好的解决方案。利用ns-3和Aquasim-ng模拟器对拒绝服务(DoS)攻击进行仿真,以确定对UWSN环境构成威胁的因素。在三种理想的水下场景下进行了仿真;1)描述了一般的UWSN(混合架构),2)一个特殊的情况描述了只有水下组件的UWSN环境,3)描述了另一个特殊的水下接收器UWSN环境。假设所有三个测试用例环境都是易受攻击的,并且对UWSN的安全性构成威胁。三种情况下,正常传输时的平均网络性能为88%,存在±3%左右的偏差。此外,它还注意到,情景1和情景2受到对手干扰或恶意活动的影响,而在没有中间无线电链路或地面汇聚节点的情况下,情景3不会产生这种影响。因此,实验发现,其中岸上水面水槽或水面浮标的中间无线电链路易受UWSN的攻击和威胁。仿真结果和观测结果表明,UWSN体系结构中的中间上行链路易受攻击,导致其不安全。同时,在纯水下环境下,似乎比一般的UWSN环境更安全。未来将在相同或不同的情况下评估更多的因素,以确定UWSN问题和其他脆弱因素
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
International Journal of Sensors, Wireless Communications and Control
International Journal of Sensors, Wireless Communications and Control Engineering-Electrical and Electronic Engineering
CiteScore
2.20
自引率
0.00%
发文量
53
期刊介绍: International Journal of Sensors, Wireless Communications and Control publishes timely research articles, full-length/ mini reviews and communications on these three strongly related areas, with emphasis on networked control systems whose sensors are interconnected via wireless communication networks. The emergence of high speed wireless network technologies allows a cluster of devices to be linked together economically to form a distributed system. Wireless communication is playing an increasingly important role in such distributed systems. Transmitting sensor measurements and control commands over wireless links allows rapid deployment, flexible installation, fully mobile operation and prevents the cable wear and tear problem in industrial automation, healthcare and environmental assessment. Wireless networked systems has raised and continues to raise fundamental challenges in the fields of science, engineering and industrial applications, hence, more new modelling techniques, problem formulations and solutions are required.
期刊最新文献
Non-orthogonal Multiple Access (NOMA) Channel Estimation for Mobile & PLC-VLC Based Broadband Communication System Optimizing Financial Decision Support Systems with Machine LearningDriven Recommendations An Energy-Balance Clustering Routing Protocol for Intra-Body Wireless Nanosensor Networks Unveiling Data Fairness Functional Requirements in Big Data Analytics Through Data Mapping and Classification Analysis An Intelligent Transport System Using Vehicular Network for Smart Cities
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1