On Modeling Eavesdropping Attacks in Underwater Acoustic Sensor Networks

被引:24
作者
Wang, Qiu [1 ]
Dai, Hong-Ning [1 ]
Li, Xuran [1 ]
Wang, Hao [2 ]
Xiao, Hong [3 ]
机构
[1] Macau Univ Sci & Technol, Fac Informat Technol, Macau, Peoples R China
[2] Norwegian Univ Sci & Technol Aalesund, Fac Engn & Nat Sci, Big Data Lab, N-6009 Alesund, Norway
[3] Guangdong Univ Technol, Fac Comp, Guangzhou 510006, Guangdong, Peoples R China
关键词
security; eavesdropping; underwater acoustic sensor networks; isotropic hydrophones; array hydrophones; COMMUNICATION;
D O I
10.3390/s16050721
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The security and privacy of underwater acoustic sensor networks has received extensive attention recently due to the proliferation of underwater activities. This paper proposes an analytical model to investigate the eavesdropping attacks in underwater acoustic sensor networks. Our analytical framework considers the impacts of various underwater acoustic channel conditions (such as the acoustic signal frequency, spreading factor and wind speed) and different hydrophones (isotropic hydrophones and array hydrophones) in terms of network nodes and eavesdroppers. We also conduct extensive simulations to evaluate the effectiveness and the accuracy of our proposed model. Empirical results show that our proposed model is quite accurate. In addition, our results also imply that the eavesdropping probability heavily depends on both the underwater acoustic channel conditions and the features of hydrophones.
引用
收藏
页数:16
相关论文
共 40 条
[11]   Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues [J].
Granjal, Jorge ;
Monteiro, Edmundo ;
Silva, Jorge Sa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (03) :1294-1312
[12]   Secure Communication for Underwater Acoustic Sensor Networks [J].
Han, Guangjie ;
Jiang, Jinfang ;
Sun, Ning ;
Shu, Lei .
IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (08) :54-60
[13]   MIMO Multiple Access Channel With an Arbitrarily Varying Eavesdropper: Secrecy Degrees of Freedom [J].
He, Xiang ;
Khisti, Ashish ;
Yener, Aylin .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2013, 59 (08) :4733-4745
[14]  
Heidemann J, 2012, PHILOS T R SOC A, V370, P158, DOI [10.1098/rsta.2011.0214, 10.1007/978-3-642-31063-8_32]
[15]  
Hodges R.P., 2010, Underwater Acoustics: Analysis, Design and Performance of Sonar
[16]   Delay-Sensitive Routing Schemes for Underwater Acoustic Sensor Networks [J].
Javaid, N. ;
Jafri, M. R. ;
Ahmed, S. ;
Jamil, M. ;
Khan, Z. A. ;
Qasim, U. ;
Al-Saleh, S. S. .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
[17]  
Jun-Chun Kao, 2006, 2006 3rd Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (IEEE Cat. No. 06EX1523), P707
[18]   A jamming approach to enhance enterprise Wi-Fi secrecy through spatial access control [J].
Kim, Yu Seung ;
Tague, Patrick ;
Lee, Heejo ;
Kim, Hyogon .
WIRELESS NETWORKS, 2015, 21 (08) :2631-2647
[19]  
Li XR, 2014, 2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS (ICCS), P538, DOI 10.1109/ICCS.2014.7024861
[20]   On modeling eavesdropping attacks in wireless networks [J].
Li, Xuran ;
Xu, Jianlong ;
Dai, Hong-Ning ;
Zhao, Qinglin ;
Cheang, Chak Fong ;
Wang, Qiu .
JOURNAL OF COMPUTATIONAL SCIENCE, 2015, 11 :196-204