A Survey on the Security of Routing Protocols for Underwater Acoustic Sensor Networks

被引:0
作者
Alharbi, Ayman [1 ]
Muzzammil, Muhammad [2 ]
机构
[1] Umm Al Qura Univ, Coll Comp & Informat Syst, Dept Comp Engn, Mecca, Saudi Arabia
[2] Harbin Engn Univ, Coll Underwater Acoust Engn, Harbin 150001, Peoples R China
来源
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY | 2022年 / 22卷 / 01期
关键词
Routing protocols; localization; security; secure routing; underwater acoustic sensor networks; COMMUNICATION; ALGORITHM; SCHEME;
D O I
10.22937/IJCSNS.2022.22.1.59
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Underwater acoustic sensor networks (UASNs) are the most widely adopted technology for a wide range of underwater applications such as monitoring of climate change impacts, monitoring of oil and gas production facilities, pollution monitoring, and military surveillance applications. However, UASNs exhibit various challenges and limitations such as high ocean interference and noise, narrow bandwidth and low data rate, long link delay, dynamic network topology, sparse deployment due to high production cost, and limited powered sensor nodes. Due to these challenges, ensuring the security of the sensor nodes and networking protocols has become more challenging. In this article, we present the results of our comprehensive survey on the security of routing protocols in UASNs. First, various network and routing layer security threats and attacks are presented. Second, the existing countermeasures to various threats and attacks are summarized. Third, the existing attack-resilient routing protocol schemes are compared in terms of their capability to address security requirements and attacks, merits and limitations, mobility, and performance metrics such as end-to-end delay, packet delivery ratio, energy consumption, and network lifetime. Finally, various recommendations and future directions are presented.
引用
收藏
页码:453 / 464
页数:12
相关论文
共 60 条
[1]   A Secure Routing Algorithm for Underwater Wireless Sensor Networks [J].
Ahmadi, M. ;
Jameii, S. M. .
INTERNATIONAL JOURNAL OF ENGINEERING, 2018, 31 (10) :1659-1665
[2]  
Akyildiz I. F., 2005, Ad Hoc Networks, V3, P257, DOI 10.1016/j.adhoc.2005.01.004
[3]   A survey on wireless mesh networks [J].
Akyildiz, IF ;
Wang, XD .
IEEE COMMUNICATIONS MAGAZINE, 2005, 43 (09) :S23-S30
[4]  
[Anonymous], 2007, Security and cooperation in wireless networks: thwarting malicious and selfish behavior in the age of ubiquitous computing
[5]  
[Anonymous], 1992, P ANN INT CRYPT C, DOI DOI 10.1007/3-540-48071-433
[6]  
[Anonymous], 2015, P 10 INT C UND NETW
[7]  
[Anonymous], P ACM S OP SYST PRIN
[8]   SecFUN: Security Framework for Underwater acoustic sensor Networks [J].
Ateniese, Giuseppe ;
Capossele, Angelo ;
Gjanci, Petrika ;
Petrioli, Chiara ;
Spaccini, Daniele .
OCEANS 2015 - GENOVA, 2015,
[9]  
Barker ElaineB., 2007, RECOMMENDATION PAIR
[10]   CARP: A Channel-aware routing protocol for underwater acoustic wireless networks [J].
Basagni, Stefano ;
Petrioli, Chiara ;
Petroccia, Roberto ;
Spaccini, Daniele .
AD HOC NETWORKS, 2015, 34 :92-104