Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2831296.2831339acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
short-paper

R-CARP: A Reputation Based Channel Aware Routing Protocol for Underwater Acoustic Sensor Networks

Published: 22 October 2015 Publication History

Abstract

In this paper we introduce R-CARP, a reputation based channel aware routing protocol for underwater acoustic sensor networks (UASNs). While many routing protocols have been proposed for UASNs, solutions to secure routing protocols from attacks such as sinkhole attack and selective forwarding are still overlooked. These routing attacks can dramatically disrupt network performance, especially in some application scenarios such as homeland security and critical infrastructure monitoring, where a high reliability on message delivery is required. Designing secure and reliable protocols for UASNs is particularly challenging due to acoustic modems unique characteristics such as low bandwidth and bit rate, high propagation delays and high energy consumption when in transmit mode. The aim of this work is therefore to propose R-CARP, a secure and reliable routing protocol tailored to such communication constrained environment. R-CARP is an improved version of CARP, the channel aware routing protocol presented in [5], enriched with a reputation based mechanism to contrast malicious node behavior. To secure R-CARP we employ BLS, a short digital signature algorithm, exploiting its aggregation property to reduce the additional communication overhead. By means of simulation based performance evaluation, we show that, under attack, R-CARP is effective at bypassing malicious nodes and outperforms CARP in terms of packet delivery ratio (PDR) and energy per bit (EPB) by a factor of up to 2, at the cost of a slight increment in terms of latency.

References

[1]
J. Alves, R. Petroccia, and J. R. Potter. MPR: Multi-Point Relay Protocol for Underwater Acoustic Networks. In Proceedings of ACM WUWNet '14, pages 16:1--16:8, New York, NY, USA, 2014.
[2]
G. Ateniese, G. Bianchi, A. T. Capossele, and C. Petrioli. Low-cost Standard Signatures in Wireless Sensor Networks: A Case for Reviving Pre-computation Techniques? In Proceedings of NDSS 2013, San Diego, CA, USA, Febraury 24-27 2013.
[3]
G. Ateniese, A. T. Capossele, P. Gjanci, C. Petrioli, and D. Spaccini. SecFUN: Security Framework for Underwater acoustic sensor Networks. In Proceedings of MTS/IEEE OCEANS 2015, pages 1--9, Genova, Italy, May 2015.
[4]
S. Azad, P. Casari, and M. Zorzi. Multipath routing with limited cross-path interference in underwater networks. IEEE Wireless Communications Letters, 3(5):465--468, Oct 2014.
[5]
S. Basagni, C. Petrioli, R. Petroccia, and D. Spaccini. CARP: A channel-aware routing protocol for underwater acoustic wireless networks. Ad Hoc Networks, Special Issue on Advances in Underwater Communications and Networks, Available on-line, August 2014.
[6]
S. Basagni, C. Petrioli, R. Petroccia, and M. Stojanovic. Optimized packet size selection in underwater wireless sensor network communications. IEEE Journal of Oceanic Engineering, 37(3):321--337, July 2012.
[7]
G. Bianchi, A. T. Capossele, A. Mei, and C. Petrioli. Flexible Key Exchange Negotiation for Wireless Sensor Networks. In Proceedings of ACM WiNTECH 2010, Chicago, Illinois, USA, 2010.
[8]
G. Bianchi, A. T. Capossele, C. Petrioli, and D. Spenza. AGREE: exploiting energy harvesting to support data-centric access control in WSNs. Ad hoc networks, 11(8):2625--2636, 2013.
[9]
D. Boneh, B. Lynn, and H. Shacham. Short signatures from the weil pairing. Journal of Cryptology, 17(4):297--319, 2004.
[10]
A. T. Capossele, V. Cervo, G. De Cicco, and C. Petrioli. Security as a CoAP resource: an optimized DTLS implementation for the IoT. In Proceedings of IEEE ICC 2015, London, UK, June 2015.
[11]
G. Dini and A. Lo Duca. A secure communication suite for underwater acoustic sensor networks. Sensors, 12(11):15133--15158, 2012.
[12]
G. Dini and A. Lo Duca. Towards a reputation-based routing protocol to contrast blackholes in a delay tolerant network. Ad Hoc Networks, 10(7):1167--1178, Sept. 2012.
[13]
M. C. Domingo. Securing underwater wireless communication networks. IEEE Wireless Communications, 18(1):22--28, 2011.
[14]
M. Goetz, S. Azad, P. Casari, I. Nissen, and M. Zorzi. Jamming-resistant Multi-path Routing for Reliable Intruder Detection in Underwater Networks. In Proceedings of ACM WUWNet '11, pages 10:1--10:5, New York, NY, USA, 2011.
[15]
J. Heidemann, M. Stojanovic, and M. Zorzi. Underwater sensor networks: applications, advances and challenges. Philosophical Transactions of the Royal Society A, 370(1958):158--175, 2012.
[16]
J. Jebadurai, A. Melvin, and I. Jebadurai. Sinkhole detection in mobile ad-hoc networks using mutual understanding among nodes. In Proceedings of ICECT 2011, volume 3, pages 321--324, April 2011.
[17]
I. Krontiris, T. Dimitriou, T. Giannetsos, and M. Mpasoukos. Intrusion detection of sinkhole attacks in wireless sensor networks. In Algorithmic Aspects of Wireless Sensor Networks, volume 4837, pages 150--161. Springer Berlin Heidelberg, 2008.
[18]
A. Menezes. An introduction to pairing-based cryptography, 2005.
[19]
L. Pescosolido, C. Petrioli, and L. Picari. A multi-band noise-aware mac protocol for underwater acoustic sensor networks. In Proceedings of IEEE WiMob 2013, Lyon, France, October 2013.
[20]
C. Petrioli, R. Petroccia, J. R. Potter, and D. Spaccini. The SUNSET framework for simulation, emulation and at-sea testing of underwater wireless sensor networks. Ad Hoc Networks, Special Issue on Advances in Underwater Communications and Networks, Available on-line, August 2014.
[21]
C. Petrioli, R. Petroccia, and M. Stojanovic. A Comparative Performance Evaluation of MAC Protocols for Underwater Sensor Networks. In Proceedings of MTS/IEEE OCEANS 2008, Quebec City, Canada, September 15-18 2008.
[22]
S. Sciancalepore, A. Capossele, G. Piro, G. Boggia, and G. Bianchi. Key Management Protocol with Implicit Certificates for IoT Systems. In Proceedings of ACM MobiSys 2015 workshop: IoT-Sys 2015, Florence, Italy, May 18 2015.
[23]
C. Tapparello, P. Casari, G. Toso, I. Calabrese, R. Otnes, P. van Walree, M. Goetz, I. Nissen, and M. Zorzi. Performance Evaluation of Forwarding Protocols for the RACUN Network. In Proceedings of ACM WUWNet '13, pages 36:1--36:8, New York, NY, USA, 2013.
[24]
G. Toso, D. Munaretto, M. Conti, and M. Zorzi. Attack Resilient Underwater Networks Through Software Defined Networking. In Proceedings of ACM WUWNet '14, pages 44:1--44:2, New York, NY, USA, 2014.
[25]
R. Urick. Principles of Underwater Sound. McGraw-Hill, 1983.
[26]
W. Wang, J. Kong, B. Bhargava, and M. Gerla. Visualisation of wormholes in underwater sensor networks: a distributed approach. International Journal of Security and Networks, 3(1):10--23, 2008.
[27]
R. Zhang and Y. Zhang. Wormhole-resilient secure neighbor discovery in underwater acoustic networks. In Proceedings of IEEE INFOCOM 2010, pages 1--9, March 2010.

Cited By

View all
  • (2024)GTR: GAN-Based Trusted Routing Algorithm for Underwater Wireless Sensor NetworksSensors10.3390/s2415487924:15(4879)Online publication date: 27-Jul-2024
  • (2024)BEKMP: A Blockchain-Enabled Key Management Protocol for Underwater Acoustic Sensor NetworksIEEE Access10.1109/ACCESS.2024.340589012(74108-74125)Online publication date: 2024
  • (2021)Internet of Underwater Things and Big Marine Data Analytics—A Comprehensive SurveyIEEE Communications Surveys & Tutorials10.1109/COMST.2021.305311823:2(904-956)Online publication date: Oct-2022
  • Show More Cited By

Index Terms

  1. R-CARP: A Reputation Based Channel Aware Routing Protocol for Underwater Acoustic Sensor Networks

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      WUWNet '15: Proceedings of the 10th International Conference on Underwater Networks & Systems
      October 2015
      228 pages
      ISBN:9781450340366
      DOI:10.1145/2831296
      • General Chairs:
      • Scott Midkiff,
      • Xiaoli Ma,
      • Publications Chair:
      • Zheng Peng
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      • ASA: American Statistical Association
      • ONRGlobal: U.S. Office of Naval Research Global

      In-Cooperation

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 22 October 2015

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Underwater security
      2. digital signatures
      3. reputation based routing
      4. sinkhole attack
      5. underwater protocols
      6. underwater sensor networks

      Qualifiers

      • Short-paper
      • Research
      • Refereed limited

      Conference

      WUWNET '15
      Sponsor:
      • ASA
      • ONRGlobal

      Acceptance Rates

      Overall Acceptance Rate 84 of 180 submissions, 47%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)3
      • Downloads (Last 6 weeks)2
      Reflects downloads up to 03 Sep 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)GTR: GAN-Based Trusted Routing Algorithm for Underwater Wireless Sensor NetworksSensors10.3390/s2415487924:15(4879)Online publication date: 27-Jul-2024
      • (2024)BEKMP: A Blockchain-Enabled Key Management Protocol for Underwater Acoustic Sensor NetworksIEEE Access10.1109/ACCESS.2024.340589012(74108-74125)Online publication date: 2024
      • (2021)Internet of Underwater Things and Big Marine Data Analytics—A Comprehensive SurveyIEEE Communications Surveys & Tutorials10.1109/COMST.2021.305311823:2(904-956)Online publication date: Oct-2022
      • (2020)Preserving Location Privacy in UASN through Collaboration and Semantic EncapsulationIEEE Network10.1109/MNET.001.190053434:4(284-290)Online publication date: Jul-2020
      • (2019)Prolonging the Lifetime of Underwater Sensor Networks Under Sinkhole AttacksProceedings of the 14th International Conference on Underwater Networks & Systems10.1145/3366486.3366516(1-5)Online publication date: 23-Oct-2019
      • (2019)Feasibility Study for Authenticated Key Exchange Protocols on Underwater Acoustic Sensor NetworksProceedings of the 14th International Conference on Underwater Networks & Systems10.1145/3366486.3366487(1-5)Online publication date: 23-Oct-2019
      • (2019)On Securing Underwater Acoustic Networks: A SurveyIEEE Communications Surveys & Tutorials10.1109/COMST.2018.286412721:1(729-752)Online publication date: Sep-2020
      • (2018)Security in UWANsWireless Networking Principles: From Terrestrial to Underwater Acoustic10.1007/978-981-10-7775-3_13(337-367)Online publication date: 14-Apr-2018
      • (2017)Securing Underwater CommunicationsProceedings of the 12th International Conference on Underwater Networks & Systems10.1145/3148675.3152760(1-5)Online publication date: 6-Nov-2017
      • (2017)Toward the Development of Secure Underwater Acoustic NetworksIEEE Journal of Oceanic Engineering10.1109/JOE.2017.271659942:4(1075-1087)Online publication date: Oct-2017
      • Show More Cited By

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media