Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Lightweight Security for Underwater IoT

  • Conference paper
  • First Online:
Advances in Computer Science and Ubiquitous Computing (UCAWSN 2016, CUTE 2016, CSA 2016)

Abstract

Becoming IoT era, RF communication on terrestrial network gets faster speed and wide communication coverage. However, because of RF has vulnerability on underwater environment, the underwater acoustic is widely adopting for replacing RF. As a result of efforts, we can suggest ‘underwater IoT’ model and its security challenge by listing UIoT security consideration and comparing underwater security protocols which are presented. Additional, we discuss side channel attack issues.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    (Counter with CBC-MAC) It is based on the AES and ARIA algorithms.

  2. 2.

    Media Access Control.

References

  1. Akyildiz, I.F., Pompili, D., Melodia, T.: Underwater acoustic sensor networks: research challenges. Ad Hoc Netw. 3(3), 257–279 (2005)

    Article  Google Scholar 

  2. Microsoft is experimenting with underwater datacenters. http://natick.research.microsoft.com/

  3. Ibragimov, M., Lee, J.-H., Kalyani, M., Namgung, J., Park, S.-H., Yi, O., Kim, C.H., Lim, Y.-K.: CCM-UW security modes for low-band underwater acoustic sensor networks. Wirel. Pers. Commun. 1–21 (2016)

    Google Scholar 

  4. Park, M., Kim, Y., Yi, O.: Light weight authentication and key establishment protocol for underwater acoustic sensor networks. J. Korean Inst. Commun. Sci. 39, 360–369 (2014)

    Google Scholar 

  5. Dini, G., Duca, A.L.: SeFLOOD: a secure network discovery protocol for underwater acoustic networks. In: IEEE Symposium on Computers & Communications, pp. 636–638 (2011)

    Google Scholar 

Download references

Acknowledgments

This research was supported by Department of Financial Information Security (BK21 + Future Financial Information Security Specialist Education Program Group), Kookmin University.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Soo-Hyun Park .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Yeom, SH., Namgung, JI., Shin, SY., Park, SH. (2017). Lightweight Security for Underwater IoT. In: Park, J., Pan, Y., Yi, G., Loia, V. (eds) Advances in Computer Science and Ubiquitous Computing. UCAWSN CUTE CSA 2016 2016 2016. Lecture Notes in Electrical Engineering, vol 421. Springer, Singapore. https://doi.org/10.1007/978-981-10-3023-9_119

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3023-9_119

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3022-2

  • Online ISBN: 978-981-10-3023-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics