A scenario after execution of Step 3

A scenario after execution of Step 3

Source publication
Article
Full-text available
Secure time synchronization is one of the key concerns for Underwater Wireless Sensor Networks (UWSNs). This paper presents a CLUster-based Secure Synchronization (CLUSS) protocol that ensures the security of synchronization under harsh underwater environments against various attacks, including Sybil attack, replay attack, message manipulation atta...

Similar publications

Article
Full-text available
Wireless sensor networks are vulnerable to various attacks. Injecting false data attack is one of the serious threats to wireless sensor network. In this attack adversary reports bogus information to the sink which causes error decision at upper level and energy waste in en-route nodes. Several authentication techniques using enroute filtering and...
Article
Full-text available
In energy-constrained wireless sensor networks (WSNs), the design of an energy-efficient smart strategy is a key to extend the network lifetime, but the unbalance of energy consumption and node load severely restrict the long-term operation of the network. To address these issues, a novel routing algorithm which considers both energy saving and loa...
Article
Full-text available
In this paper, a distributed solution is proposed for detecting boundaries and holes in the WSN using only the nodes connectivity information. The run of our protocol is divided imto three main steps. In the first step, each node collects connectivity information of its onehop neighbors and constructs its onehop neighbors’ graph. In the second step...
Article
Full-text available
Wireless sensor networks (WSNs) have several constraints of the sensor nodes such as limited energy source, low memory size and low processing speed, which are the principal obstacles to design efficient protocols for WSNs. Major challenges of WSNs are to prolong the network lifetime and throughput. This paper explores performance of WSNs in differ...
Article
Full-text available
Itinerary plan determines the order of locations that controllable-mobile sink(s) has to sojourn at them, where is a challenging issue especially for the resource constrained Wireless Sensor Networks (WSNs). Despite of approved advantages for collecting sensed information by the mobile sink(s), itinerary planning may effect on other techniques, hen...

Citations

... These studies depend on the authentication of underwater vehicles only in [9][10][11][12]. However, the studies that rely on detecting malicious nodes can be found only in [13,14], which depend on the trustworthiness/privacy provision in UWSN. ...
Article
Full-text available
Security is one of the major concerns while designing robust protocols for underwater sensor networks (UWSNs). The underwater sensor node (USN) is an example of medium access control (MAC) that should control underwater UWSN, and underwater vehicles (UV) combined. Therefore, our proposed method, in this research, investigates UWSN combined with UV optimized as an underwater vehicular wireless network (UVWSN) that can completely detect malicious node a acks (MNA) from the network. Thus, MNA that engages the USN channel and launches MNA is resolved by our proposed protocol through SDAA (secure data aggregation and authentication) protocol deployed in UVWSN. SDAA protocol plays a significant role in secure data communication , as the cluster-based network design (CBND) network organization creates a concise, stable, and energy-efficient network. This paper introduces SDAA optimized network known as UVWSN. In this proposed SDAA protocol, the cluster head (CH) is authenticated through the gateway (GW) and the base station (BS) to guarantee that a legitimate USN oversees all clusters deployed in the UVWSN are securely established for providing trustworthiness/privacy. Furthermore, the communicated data in the UVWSN network guarantee that data transmission is secure due to the optimized SDAA models in the network. Thus, the USNs deployed in the UVWSN are securely confirmed to maintain secure data communication in CBND for energy efficiency. The proposed method is implemented and validated on the UVWSN for measuring reliability, delay, and energy efficiency in the network. The proposed method is utilized for monitoring scenarios for inspecting vehicles or ship structures in the ocean. Based on the testing results, the proposed SDAA protocol methods improve energy efficiency and reduce network delay compared to other standard secure MAC methods.
... - [27] Physical authentication Prevention Improves the time synchronization accuracy ...
... One of the primary concerns in a UWSN is achieving secure time synchronization. The authors in [27] propose CLUster-based Secure Synchronization (CLUSS) protocol characterized by accurate synchronization and deployed to achieve security. An underwater sensor network with a large number of uniformly scattered static nodes (or nodes with low mobility relative to signal propagation speed) is considered. ...
... This is the author's version which has not been fully edited and The adaptive neural fuzzy inference system was used to evaluate the reliability of sensor nodes in [31]. In [27], a distributed outlier detection scheme called Central hyper ellipsoid support vector machine (CSVMS) was used to detect end-to-end abnormal delay and identify malicious nodes [27]. Besides the above, K − means and support vector machine algorithm was used in [33] to generate the trust evaluation model to solve the problem of insufficient evidence as a result of scarce/sparse environment 7 . ...
Article
Full-text available
Underwater sensors and acoustic networks have several unique applications including water quality and ocean life monitoring as well as ocean navigation and exploration. They also have peculiar physical layer characteristics with respect to operating frequency and attenuation which makes them different from terrestrial wireless sensor communication, thus coupled with their large cost of deployment, and sensitivity, they are highly vulnerable, to security attacks. For instance a Sybil node could pretends to be at several other locations in the sparse network at the same time thereby deceiving legitimate nodes and infringing on the security of transmitted information. Over the last few years, researchers have studied means of preventing, detecting, and mitigating Sybil attacks for safe underwater communication under different assumptions and architectural setups. However, to our knowledge, these efforts have been scattered in literature and concrete lessons have not been drawn from these efforts towards achieving a safe underwater communication via a survey/review on this subject. This motivates the presentation of this paper that provides an exposition of the academic discussion on the solutions for addressing Sybil attacks in underwater wireless communication, with respect to attack prevention, detection and mitigation while identifying some of their limitations. Similarly, proposed methods and technical aspects peculiar to these works are identified, and an wide range of challenges, opportunities as well as providing recommendations.
... Kong et al. [39] proposed a dual-channel synchronization mechanism (DCH-sync) that achieves synchronization through a mobile beacon and dual CHs. Xu et al. [40] proposed a cluster-based secure synchronization (CLUSS) method. Simulation results show that it decreases errors and reduces synchronization messages. ...
Article
Full-text available
Time synchronization is the basis of coordination and cooperation in underwater acoustic networks. However, because of the propagation delay, node mobility, and Doppler shift, it is impossible to balance the accuracy and energy consumption simply in water. As a promising technology, partial clustering has high convergence and makes breakthroughs in time synchronization. This paper proposes PCDE-Sync, a novel synchronization mechanism with partial clustering and the Doppler effect. Firstly, a clustering method built on the artificial fish swarm algorithm is presented. It models the cluster construction according to fish's preying, swarming, and following behaviors. Secondly, we design a synchronization mechanism to conduct clock correction and compensation by the Doppler effect. Finally, we compare the performance of PCDE-Sync with the most advanced protocols, namely MU-Sync, MM-Sync, and DE-Sync, in terms of the cumulative error after synchronization, the mean square error under different clock skew and that under distinctive node mobility, and energy consumption. The experimental results show that PCDE-Sync makes a trade-off between accuracy and complexity, which does well in solving synchronization issues.
... Use of clustering improves the lifetime of the system [13][14][15]. Xu et al. [16] proposed a CLUster-based Secure Synchronization (CLUSS) protocol that guarantees synchronization security even under harsh underwater environments w.r.t. numerous malicious attacks such as sybil attack, delay attack, replay attack, and message manipulation attack. ...
Article
Full-text available
Security is one of the main objectives while designing protocols for underwater wireless sensor networks (UWSN), since the sensors in UWSN are vulnerable to malicious attack. So it becomes easy for opponents to manipulate the communication channel of UWSN and its nodes. Authentication and data integrity play important roles in the context of security to make network scalable and survivable. Hence in this paper, a secure authentication and protected data aggregation method for the cluster based structure of UWSN is proposed as because cluster based arrangement produces a concise and stable network. In this technique, the cluster head in each cluster is authenticated by the gateway to ensure that all the clusters are being handled by valid nodes. Also, the data being communicated in the network will be securely handled to ensure that it will not get compromised during network operations. In this way, the security of all the nodes is ensured to maintain safe network communication. The proposed technique improves the data reliability in the network by reducing the energy consumption and delay. Here, the proposed method is moreover compared with the state of the art techniques to prove the validity and effectiveness.
... A Cluster-based Secure Synchronization (CLUSS) protocol investigated in [87] works with the following three phases: authentication, inter-cluster and intra-cluster synchronization. It tries to remove malicious nodes as follows: i) Unicast messages are authenticated with unique pair wise keys shared between the related nodes. ...
... Their performance in real UWANs needs more tests Countermeasures against typical threats [61] Jamming Jamming detection through abnormality measurement Possible misjudgement on jamming attack events [75] attack Game theory and reinforcement learning Open issues on detecting jointly used to detect jamming attack smart attack [76] A hypothesis test of a method [75] in a UWAN Complex with high computation load [78] Support vector machine (SVM) used in attack detection Difficult assumptions: stable channels, [82] Dempster-Shafer theory used for attack detection stationary nodes, synchronized system time [45] Location Jamming avoidance realized by a single-round protocol Performance affected by the jammer's activity UPS [64] spoofing Anchor nodes used to broadcast beacons The beacon signals can be while nodes listen silently forged without authentication. Dis-VoW [51] Wormhole Visualizing distortions in the lengths Insecure distance estimation may attack and angles of edges for attack detection affect detection accuracy [84] Signal's direction of arrival (DoA) which is Affected by unpredictable node mobility not manipulatable is used in attack detection caused by water currents [85] Sybil A special node used to broadcast Affected by the availability of attack beacon messages for attack detection beacon nodes and node density [69] SYN Statistical correlation between sending Poor protocol adaptability to attack and receiving times used in attack detection dynamic UWANs CLUSS [87] Centred hyper ellipsoidal SVM used to detect outlier More study needed for key distribution process Schemes ...
Article
Underwater acoustic networks (UWANs) are often deployed in unattended and untransparent or even hostile environments and face many security threats, while many applications based on UWANs require secure communication, such as costal defense#,submarine communication and harbor security. Peculiar features of UWANs such as very constrained resources pose big challenges in defending UWANs against security threats, and many research results are published to address these issues along with several brief surveys available in the literature. This paper aims to provide a comprehensive survey on UWAN security by first discussing the fundamental of network security in general and the main UWAN security threats faced by the physical layer to the transport layer. Then the paper reviews countermeasure schemes against the typical UWAN security threats, securing UWAN protocols and cryptographic primitives designed for UWANs as well as UWAN security structures that address several security issues systematically. The research of UWAN security is still in an early stage, and the paper discusses several important issues necessarily for further studies at the end.
... In [6], a cluster-based secure synchronization (CLUSS) protocol is proposed for UASNs. CLUSS consists of three phases: an authentication phase, inter-cluster synchronization phase, and intra-cluster synchronization phase. ...
Article
UASNs are widely used in many applications, and many studies have been conducted. However, most current research projects have not taken network security into consideration, despite the fact that a UASN is typically vulnerable to malicious attacks due to the unique characteristics of an underwater acoustic communication channel (e.g., low communication bandwidth, long propagation delays, and high bit error rates). In addition, the significant differences between UASNs and terrestrial wireless sensor networks entail the urgent and rapid development of secure communication mechanisms for underwater sensor nodes. For the above mentioned reasons, this article aims to present a somewhat comprehensive survey of the emerging topics arising from secure communications in UASNs, which naturally lead to a great number of open research issues outlined afterward.
... Several malicious codes target the wireless network through different portable devices like laptops, smart phones and tablets. For the security of clock synchronization in WSNs, a cluster-based secure synchronization protocol (CLUSS) is proposed [9]. The process of CLUSS comprises three stages: authentication phase, inter-cluster synchronization phase and intra-cluster synchronization phase. ...
Article
Full-text available
This paper discusses the security of the clock synchronization algorithm based on the biological example of Asian Fireflies in wireless sensor networks. Huge swarms of these fireflies use the principle of pulse coupled oscillators in order to synchronously emit light flashes to attract mating partners. When applying this algorithm to real sensor networks, the potential threat of hostile flashes may disturb this synchronization. An improved Reachback Firefly Algorithm is implemented in the MAC layer of wireless sensor networks (WSNs), which change coupling strength among oscillators to anti hostile attack in clock synchronization. Its security is analyzed through a Susceptible-Infective-Recovered epidemic model. Numerical results and simulations are provided for further understanding of the analysis.
Article
This review article focuses on the Underwater Wireless Sensor Network (U0s) based on localization and routing. Moreover, this review mainly incorporates several research articles based on the date of publication, domains, journals, authors, and methodologies utilized for studies. The results discussed in this work are solely based on prior published research-based information obtained. The research articles are searched and utilized from 2014 to 2021 from different resources. In the localization have several techniques and algorithm with numerous features namely accuracy, capability of resource, and deployment restriction. then, the routing based on the various approaches and algorithm with several parameters like energy consumption, packet delivery ratio, network lifetime, and so on., are reviewed. Here many of the machine learning techniques are highly focused in UWSNs. This work provides a better understanding of Underwater Wireless Sensor Network; therefore, an effective technique can be compared and achieved in terms of better performance.
Article
Full-text available
Clock synchronization is an important component in many distributed applications of wireless sensor networks (WSNs). The deprived method of clock offset and skew estimation causes inaccuracy, synchronization delay, and communication overhead in the protocols. Hence, this paper exploits two techniques of variation truncated mean (VTM) and whale optimization (WO) to enhance the synchronization metrics. Sensor nodes are grouped into several non-overlapped clusters. The cluster head collects the member nodes’ local time and computes the synchronization time 𝑆𝑍𝑡 using the truncated mean method. Nodes with a high variation in the timings compared to a preset value are truncated. The head node broadcasts the 𝑆𝑍𝑡 in which the whale optimization is aiming at each node to reduce the synchronization error. The intra and inter-cluster synchronizations are accomplished through the multihop message exchange approach. The theoretical analysis is validated, and the simulation outcomes show that the performance metrics in the proposed work are better than the conventional methods by achieving minimum error value.
Article
In an underwater environment, wireless sensor networks (WSNs) have more potential applications such as homeland safety, naval surveillance, and pollution & exploration monitoring. Underwater wireless sensor networks (UWSNs) help in decreasing the rate of causalities and provide efficient ways for monitoring the underwater activities of the other countries. UWSNs can be efficiently used by the navy to monitor suspicious activities and also to counter‐attack any terrorist or enemy attacks. As usual, deploying wireless sensor networks underwater is not only challenging due to environment and constrained resources but also is vulnerable to security attacks. Thus, security is an unexplored and crucial aspect of UWSNs. Here, we define a node authentication mechanism for UWSNs for securing frontier lines, maritime territory, and naval surveillance. The proposed authentication protocol is based on symmetric‐key cryptography and secures against impersonation, masquerade, Sybil, and many more other attacks. We have analyzed the proposed protocol both formally and automatedly and were unable to find any possible security attack on the proposed protocol. The experimental analysis of the mechanism proved that the proposed mechanism consumes less energy compared to the existing mechanisms. Hence, the proposed mechanism can be easily adopted for maintaining the security of maritime territory and reduce the causalities in naval operations.